Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1 2932Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
1 35871.why we use derived role in sap security?2.what is the technical difference between master and derived role?
KPMG,
1 3021Post New SAP Security Questions
Differentiate between temp role and copy role
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Explain secure store and forward?
What is the use of tmssup* rfc destinations?
Differentiate between derived role and composite role
What are the most used tables in sap?
What happens to change documents when they are transported to the production system?
What are the uses of an authorization group?
What are su53 t-codes used for?
what is user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Explain x-glueb and its use in sap security.
What does the pfcg_time_dependency clean up?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW