why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute
5 8137. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
1 5249what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24
2 18786what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 2992I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?
3 14262what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1 7840Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
IBM,
1784Post New SAP Security Questions
What is use of derived roles?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What are the uses of an authorization group?
how to do Reporting and Analysis authorizations
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
what is the different b/w su10 and su12
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
how we can see FFID if firefighter not able to see FFids ?
What is a composite role?
Explain document transfer-level security?