Hi Everyone, can anyone suggest the best institute in
Ameerpet, HYD for SAP Security Course.
Thnks
Ankur
Answer Posted / ramesf
keylabs is good for sap security
Is This Answer Correct ? | 0 Yes | 5 No |
Post New Answer View All Answers
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Differentiate between derived role and composite role
Support types of WOs you have faced?
You want to create and maintain user master record. What authorization would you need?
How to find out who has deleted users in the system?
Explain network topology in sap systems?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the difference between usobx_c and usobt_c?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
User is not there in User master record. Then how to trace the user?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What is the difference between the table buffer and the user buffer?
Is it possible to change role template? How?
How to update risk id in rule set?