Answer Posted / krishna
derived roles are commonly used
if not let me know
Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
What are the upgrades happened in GRC 5.3 from GRC 5.2?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Any details about secatt apart from SAPSecurity online.com?
Explain transport system-level security?
What profile versions?
What are su53 t-codes used for?
what is your ticketing tool? can we give some details about how we are getting tickets
Authorization check on s_btch_job failed. What would happen now?
Can you explain protecting public keys?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Attributes in SE01?
Which t-code can be used to delete old security audit logs?
Explain protecting public keys?
What is the use of su56?
Explain snc in sap security?