SAP SECURITY Training in Hyderbad,contact 7893255000. R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools. Will provide guidance on real time concepts and profile prepartion also.
2 56101.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?
IBM,
3 23862Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
10 16803What is the name of background job in FF that is responsible for sending notification and logs to FF id controller ?
IBM,
4 11420What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?
3 11678What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
13 29244I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?
1 8035Post New SAP Security Questions
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
what is the difference between usobt_c and usobx_c?
By which parameter number of entries are controlled in the user buffer?
what are all the questions covered in "profiles related concepts " please let me know ?
what is use of copy data in derived role and when we use this one ???
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
You want to remove a developer's and developer keys from a system. How would you do that?
Which tables will you use for making customizing setting for security administration?
Support types of WOs you have faced?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What are the different types of sap security tables?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
What are su53 t-codes used for?