Answer Posted / knreddy
dilog user, syste user, trns por use, like that 5 type of
users
Is This Answer Correct ? | 0 Yes | 30 No |
Post New Answer View All Answers
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Authorization check on s_btch_job failed. What would happen now?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What are the uses of an authorization group?
Attributes in SE01?
As a SAP security consultant what is the most challenged you faced in previous company?
What is stad?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Tell me about derived role?
What are su53 t-codes used for?
You want to remove a developer's and developer keys from a system. How would you do that?
What is the maximum number of profiles in a role and maximum number of object in a role?
what is the different b/w su10 and su12
What does the profile generator do?