Answer Posted / gaurav
One can also use "Authorization Data" functionality in
transaction SU10 to complete this task.
Is This Answer Correct ? | 19 Yes | 0 No |
Post New Answer View All Answers
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Explain x-glueb and its use in sap security.
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What does the item category specify in a purchasing requisition in SAP Materials Management?
What are st01 t-codes used for?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What happens to change documents when they are transported to the production system?
When would you update a sap table directly? What precautions would you taje?
What is sap cryptographic library?
What does the item category specify in a purchasing order in SAP Materials Management?
Can you explain protecting public keys?
Can you explain sap system transactions?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Can you explain transport system-level security?