How many maximum profiles we can assign to one user?
Answer Posted / purushotham
THANK YOU SUBAL.....
| Is This Answer Correct ? | 5 Yes | 5 No |
Post New Answer View All Answers
Can you explain document transfer-level security?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Explain secure store and forward?
how we do CUA configuration in Quality system
What are se10 t-codes used for?
What is the main purpose of parameters, groups & personalization tabs?
What are the most used tables in sap?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can you explain secure store and forward?
Which t-code can be used to delete old security audit logs?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)