SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
3 5922The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
IBM,
2444What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
IBM,
2 15128Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
IBM,
3 9841Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13608Post New SAP Security Questions
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
How to assign any program to user?
What are su22 t-codes used for?
Tell me about derived role?
How can I do a mass delete of the roles without deleting the new roles?
what is use of copy data in derived role and when we use this one ???
what is the main difference between the derived role and a single role?
What is the main purpose of parameters, groups & personalization tabs?
What is sap cryptographic library?
Can you explain secure store and forward?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Can you explain snc in sap security?
How to find ECC system, GRC system and BI system ?
Can you explain sap system transactions?