why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute
5 10218. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
1 6126what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24
2 20442what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 3874I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?
3 15988what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 8890Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
IBM,
2340Post New SAP Security Questions
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
Can you explain network topology in sap systems?
What are se09 t-codes used for?
Explain sap system transactions?
What is t code?
How we Educated client personnel in R/3 Security and general Basis knowledge
Differentiate between saml token profile and a sap logon ticket
how you can delete multiple roles from qa, dev and production system?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What are pfud t-codes used for?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Can wildcards be used in authorizations?
What is use of derived roles?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.