Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is use of su56?

Answer Posted / srinu

Display user buffers

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

As a SAP security consultant what is the most challenged you faced in previous company?

1105


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1376


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2160


What are the uses of an authorization group?

1203


Tell me about derived role?

1082


what are the issues you faced with UME?

3066


What are su56 t-codes used for?

1259


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2451


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1072


What does the item category specify in a purchasing requisition in SAP Materials Management?

1525


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2243


what is your ticketing tool? can we give some details about how we are getting tickets

1603


How to find ECC system, GRC system and BI system ?

1235


Explain internet-level security?

1148


Explain protecting public keys?

1277