Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16440How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?
2 13614What is the latest change that was done to the SU53 trace, which is used to find the last authorization failure in SAP..???
4 17139does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile
4 7386Post New Tech Mahindra SAP Security Interview Questions
What is the functionality of actionservlet and requestprocessor?
How do I install java on windows?
any one can explain about policy file rule? when i connect database with applet then ther is no compile time error but the run time error is occureed.i.e access is denied.policy file rule is related to this problem.
Explain ngmodule?
how is the range of ip addresses defined for a windows server 2008 dhcp server? : Windows server 2008
How do you balance the benefits and risks of Alprazolam treatment when considering its prescription for an elderly patient with multiple comorbidities?
Can we modify the attribute's value of the html tag dynamically?
What is macro and its types?
I am trying to create a new universal user group. Why can't i? : java security
difference between assert and verify.
What are the differences between joiner transformation and source qualifier transformation?
What are the disadvantages of using basic internet for Cloud computing?
Which is better ubuntu or mint?
How do you sort a table in word?
In qtp, explain what is crypt object