How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
IBM,
2244how to do Assigning authorization groups for table restrictions and program restrictions.
IBM,
1 6241how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
IBM,
2341how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
2143how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
2336how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
IBM,
1 7166Post New SAP Security Questions
what is the different b/w su10 and su12
Can you explain document transfer-level security?
Is it possible to change role template? How?
How do you check background jobs?
What are se09 t-codes used for?
You want to remove a developer's and developer keys from a system. How would you do that?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
What happens to change documents when they are transported to the production system?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Can you explain sap system transactions?
You want to create and maintain user master record. What authorization would you need?
What is the difference between role and a profile?
Explain transport system-level security?
What are su22 t-codes used for?
Which transaction should not be given to BASIS and DEV team in Production?