Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1 3020Hiiiiii ..frnds... Pls tell me.... We know that we are using 2 transport request. Customizing and work bench request.I want to know which are comes under work bench and which are comes under customising???
1 36961.why we use derived role in sap security?2.what is the technical difference between master and derived role?
KPMG,
1 3113Post New SAP Security Questions
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
By which parameter number of entries are controlled in the user buffer?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
how we can see FFID if firefighter not able to see FFids ?
what is user base in sap security?
What are the uses of an authorization group?
Can you explain snc in sap security?
how you can delete multiple roles from qa, dev and production system?
Explain secure store and forward?
Explain x-glueb and its use in sap security.
How to insert missing authorization?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Authorization check on s_btch_job failed. What would happen now?
what is the use of defaults tab in start menu