can u secure profiles ? if so , hou to do it ?

Answer Posted / gaurav

The object should be S_USER_PRO. Guess thois might have
been a definite typo in the above answer

Is This Answer Correct ?    12 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

1875


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1799


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

678


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

1561


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1646






Can you explain snc in sap security?

652


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

757


what is the different b/w su10 and su12

2185


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3055


What is Sap security t-codes?

721


What is sap’s grc?

728


Which transaction should not be given to BASIS and DEV team in Production?

1914


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4149


Which tables will you use for making customizing setting for security administration?

712


What does the pfcg_time_dependency clean up?

812