How many maximum profiles we can assign to one user?
Answer Posted / siva
yes it is 312
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are su25 t-codes used for?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Explain snc in sap security?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Can you explain transport system-level security?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Differentiate between usobx_c and usobt_c
what is the main difference between the derived role and a single role?
What are pfud t-codes used for?
What is the use of tmssup* rfc destinations?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?