Whr will u find u Error logs in BI security and What
are Error logs will come and how will u solve that
Answer Posted / abhijit
We can use Tcode RSECPROT also for checking Error Logs
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
When would you update a sap table directly? What precautions would you taje?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What is the difference between the table buffer and the user buffer?
What does the item category specify in a purchasing requisition in SAP Materials Management?
As a SAP security consultant what is the most challenged you faced in previous company?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Explain secure store and forward?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
What does the profile generator do?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
what is user base in sap security?
What are the uses of an authorization group?