What is the latest change that was done to the SU53 trace, which is used to find the last authorization failure in SAP..???
4 1744611.If the user don't have the access of su53?then how to fine the user missing authorization with out using st01?
6 19794Please provide me defination for the follwing objects. S_user_GRP S_USER_AUT S_USER_AGR S_USER_PRO S_USER_SYS S_USER_SAS
1 17795Post New SAP Security Questions
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Which tables will you use for making customizing setting for security administration?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Differentiate between usobx_c and usobt_c
What are the different types of sap security tables?
what is user buffer?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
What is use of derived roles?
Can wildcards be used in authorizations?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Explain internet-level security?
What is the difference between authorization object and authorization object class?
What authorization are required to create and maintain user master records?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What is the difference between the table buffer and the user buffer?