Answer Posted / john
All the CUA users starting with _CUA
That is the only difference .
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
what is authorization object and authorization object class?
Can you explain protecting public keys?
what is use of copy data in derived role and when we use this one ???
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is the maximum number of profiles in a role and maximum number of object in a role?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
As a SAP security consultant what is the most challenged you faced in previous company?
What is sap internet transaction server?
Which transaction should not be given to BASIS and DEV team in Production?
What does the item category specify in a purchasing requisition in SAP Materials Management?
What appears as the last sentence in sap note 587410?