Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one.
CTS,
2 8642What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code?
7 53898Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?
4 13410some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?
1 9490Post New SAP Security Questions
What authorization are required to create and maintain user master records?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
Can wildcards be used in authorizations?
How to insert missing authorization?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
what is the process to find that one consultant had removed a table from sap tables
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Can you explain internet-level security?
Differentiate between derived role and composite role
what is the main difference between the derived role and a single role?
What is Sap security t-codes?
Which transaction should not be given to BASIS and DEV team in Production?
How to create users?