Answer Posted / sasigopal
Hi,
composit and single role commnly used.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is the difference between c (check) and u (unmaintained)?
what is user buffer?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How can I do a mass delete of the roles without deleting the new roles?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
What is the use of su56?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Explain sap system transactions?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
how we do CUA configuration in Quality system
What appears as the last sentence in sap note 587410?