we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem6 12115
Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?4 11299
in which table we can find all authorization groups5 13262
Post New Cognizant SAP Security Interview Questions
What is laravel service container?
Clarify the architecture of django?
What are the different aop implementations?
What are system integrators?
is WCT aplicable on educational institutions also??????
What are the automation tools did you worked and how it different from one to another?
all c language question
What is “chmod” command?
Explain what are the essential components of embedded system?
Is postgres a sql database?
why asa method ZPF method is more accurate than ASA method?
List the benefits of using an expression language?
What are the advantages/disadvantages of mysql and php?
Under what circumstances do page faults occur? Describe the actions taken by the operating system when a page fault occurs?
What is preinitialization of a servlet?