we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem5 9181
Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?4 9588
in which table we can find all authorization groups5 11296
How to call an activity from java step?
What is public-key cryptography ?
TILL WHAT LEVEL OF SECURITY BO SUPPORTS?
What is life cycle?
What is the username and password for the installed client? If I need to create a username and password, what do I need to do?
dear friends pls explain me what is meant by positive seal in solenoid operated valve
In android, which is two location providers that you can use to obtain your position data?
How can sap solution manager support me in an upgrade project?
Hi Guys This is Sujith currently am residing in us of a i have issues attending interview calls thou am prepared for it i would really appreciate if someone from here could help me out with tips and thier valuable inputs on sap sd it would be great if someone could contact me on below given information thanks sujith email : email@example.com yahoo id : firstname.lastname@example.org
What are limitations of wordpress?
can you outline the various steps in an analytic project?
What are the different types of backups that exist?
What is an (asset) transaction type in fi-aa? : fi- asset accounting
What is a storage engine in mongodb?
What is json text?