How to assign more than 312 profiles to any user?? As 312 profiles are limited to assign in any user account.
2 14975Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity
1 8229Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
3 13746How will you mitigate a user against an authorization object which is decided as sensitive by Business
IBM,
1 8495Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
4713Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how
2 11006Post New SAP Security Questions
how we can see FFID if firefighter not able to see FFids ?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
When would you update a sap table directly?
What are se09 t-codes used for?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is the use of Personalization tab in SU01?
Explain network topology in sap systems?
What does user compare do?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What are su25 t-codes used for?
Which t-code can be used to delete old security audit logs?
How to insert missing authorization?
what is centralize FFID?