The system raised a message that authorizations are missing but you have SAP-ALL. What would you do?
3 9957Hi Friends, I am sudheer from Hyderabad. i am looking for the training on SAP SECURITY GRC. KIndly let me know what are the best institute to learn in ameerpet area for this. Thanking you in advance.
6 11319Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
L&T,
2144The user have auth-obj in his profile but he's not able to execute, if he run su53 he's not getting the error and also we cannot able to execute st01 if I do user buffer also its not fetching any data what should I do?
2 6468does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile
4 7686Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)
1 6366i have one role in development then this role need to be available in production how to achieve this?
5 9008Post New SAP Security Questions
By which parameter number of entries are controlled in the user buffer?
When would you update a sap table directly? What precautions would you taje?
how a t code works
what things you have to take care before executing run system trace?
What is the main purpose of parameters, groups & personalization tabs?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What are pfud t-codes used for?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
How we Educated client personnel in R/3 Security and general Basis knowledge
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Differentiate between derived role and composite role
Which transaction should not be given to BASIS and DEV team in Production?