Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?
1 2162Is there a table for authorizations where I can quickly see the values entered in a group of fields?
1246Post New SAP Security Questions
Explain internet-level security?
What is sap cryptographic library?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
what things you have to take care before executing run system trace?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are se10 t-codes used for?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What is t code?
How can sap security be improved?
Can wildcards be used in authorizations?
what is user base in sap security?
Explain sap system transactions?
What are su22 t-codes used for?
What are the different types of sap security tables?