How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
IBM,
2311how to do Assigning authorization groups for table restrictions and program restrictions.
IBM,
1 6328how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
IBM,
2413how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
2203how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
2390how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
1 7256Post New SAP Security Questions
What are se10 t-codes used for?
How we schedule and administering background jobs?
What is the procedure for role modifications?
what things you have to take care before executing run system trace?
what is the different b/w su10 and su12
How to codify for an Item in SAP? How many digits are required for an item?
What are the most used tables in sap?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
what is the use of defaults tab in start menu
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Explain x-glueb and its use in sap security.
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Differentiate between temp role and copy role
When would you update a sap table directly?
How do we test security systems.