can u secure profiles ? if so , hou to do it ?
Answer Posted / gaurav
The object should be S_USER_PRO. Guess thois might have
been a definite typo in the above answer
Is This Answer Correct ? | 12 Yes | 1 No |
Post New Answer View All Answers
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Can you explain snc in sap security?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
what is the different b/w su10 and su12
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is Sap security t-codes?
What is sap’s grc?
Which transaction should not be given to BASIS and DEV team in Production?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Which tables will you use for making customizing setting for security administration?
What does the pfcg_time_dependency clean up?