Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How to assign more than 312 profiles to any user?? As 312 profiles are limited to assign in any user account.

Bosch, Infosys,

2 15086

How can assign miising authorizations in BI?

Philips,

1 11498

how to resolve role conflict

IBM,

2 10614

Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity

1 8297

what is the process to find that one consultant had removed a table from sap tables

2579

how to delete a role?

IBM,

2 7726

what is diff b/w su01 and su10?

IBM,

5 26980

what is SOD?

IBM,

3 10020

What are the upgrades happened in GRC 5.3 from GRC 5.2?

4266

Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

3 13883

What's the use of Detour path? How Fork path differs from Detour path

1 10913

How will you mitigate a user against an authorization object which is decided as sensitive by Business

IBM,

1 8594

Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4773

Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how

2 11135

What does PRGN_STAT & TCODE_MOD table consist of?

2 10854


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What are su22 t-codes used for?

1203


You want to remove a developer's and developer keys from a system. How would you do that?

1153


what is sod in sap security?

1298


How do you check background jobs?

1241


What is sap cryptographic library?

1125


How we schedule and administering background jobs?

1200


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2717


What is the difference between the table buffer and the user buffer?

1286


What is the maximum number of profiles in a role and maximum number of object in a role?

1086


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2491


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2697


Any details about secatt apart from SAPSecurity online.com?

2372


What are pfud t-codes used for?

1338


Can you explain transport system-level security?

1302


What are the most used tables in sap?

1263