Answer Posted / ram
instead of that we can assign profile, which is already existed role having desired t-code
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What does the pfcg_time_dependency clean up?
Why is it important to delete sap-new profile? What steps will you take to do this?
Which tables will you use for making customizing setting for security administration?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Can you explain sap system transactions?
How do we test security systems.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What are su56 t-codes used for?
what is use of copy data in derived role and when we use this one ???
What are the uses of an authorization group?
What is the main purpose of parameters, groups & personalization tabs?
What is the difference between c (check) and u (unmaintained)?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
how a t code works
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach