How to assign more than 312 profiles to any user?? As 312 profiles are limited to assign in any user account.
2 15086Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity
1 8297Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
3 13883How will you mitigate a user against an authorization object which is decided as sensitive by Business
IBM,
1 8594Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
4773Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how
2 11135Post New SAP Security Questions
What are su22 t-codes used for?
You want to remove a developer's and developer keys from a system. How would you do that?
what is sod in sap security?
How do you check background jobs?
What is sap cryptographic library?
How we schedule and administering background jobs?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What is the difference between the table buffer and the user buffer?
What is the maximum number of profiles in a role and maximum number of object in a role?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Any details about secatt apart from SAPSecurity online.com?
What are pfud t-codes used for?
Can you explain transport system-level security?
What are the most used tables in sap?