When transporting a role. What table & table data gets transported. Exact table names please?
2 8013I have a custom tables, for which I created auth group, which contains another 2 tables. Now I have assigned this table to user, but still he cannot access the table. What's the reason? User buffer is fine and not exceeded.
HCL,
2 5496Providing training for SAP Security & GRC. SAP Security includes ECC Security,HR Security,SRM Security,CRM SECURITY,BI Security GRC 10.0 & 10.1 For further details send an email to sapsecuritygrc5.3@gmail.com or contact 971 563356167
CCC,
2 3604Post New SAP Security Questions
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
could anyone tell me how we can copy the mass roles from sap_all profiles???????
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
what is user base in sap security?
You want to create and maintain user master record. What authorization would you need?
What are se09 t-codes used for?
explain the personalization tab within a role?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Which tables will you use for making customizing setting for security administration?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are su22 t-codes used for?
What is the use of su56?
What is stad?
You want to remove a developer's and developer keys from a system. How would you do that?