can we assign roles to user without user master comparison3 5791
how to assign a tcode to user without a role?6 10763
The system raised a message that authorizations are missing but you have SAP-ALL. What would you do?3 7547
You want to force a user to change their password. How would you do it?2 6133
Hi Friends, I am sudheer from Hyderabad. i am looking for the training on SAP SECURITY GRC. KIndly let me know what are the best institute to learn in ameerpet area for this. Thanking you in advance.5 6104
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
What is a Role in Sap Security and Types of Roles and use of the role?2 7941
What are the 5 things you'll do if you have sap system to maintain (Sap securiy)1 5527
The user have auth-obj in his profile but he's not able to execute, if he run su53 he's not getting the error and also we cannot able to execute st01 if I do user buffer also its not fetching any data what should I do?2 4751
if user enters a tcode how the system knows what action should be done ?3 8663
what is the difference between adding tcode in menu and adding tcode using s_tcode ?2 6647
does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile4 5103
Tell me about your SAP Career? (all interviews start with this queshion only...pls tell me a template for this answer)1 4477
i have one role in development then this role need to be available in production how to achieve this?5 6244
Explain snc in sap security?
What are pfud t-codes used for?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Attributes in SE01?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Differentiate between temp role and copy role
By which parameter number of entries are controlled in the user buffer?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
How to find ECC system, GRC system and BI system ?
Explain x-glueb and its use in sap security.
How can you get the user list in sap?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
what is user base in sap security?
What does the profile generator do?
what is sod in sap security?