Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

How to insert missing authorization?

1136

What is the t-code used for locking the transaction from execution?

1 2180

what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1072

What profile versions?

1181

How to create users?

1212

Which t-code can be used to delete old security audit logs?

1478

What is a derived role?

1 1932

what is the difference between usobt_c and usobx_c?

1346

How can I do a mass delete of the roles without deleting the new roles?

1454

How many transactions codes can be assigned to a role?

2 2612

How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

1372

How we schedule and administering background jobs?

1123

Can wildcards be used in authorizations?

1197

What does the pfcg_time_dependency clean up?

1255

What does the profile generator do?

1120


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is t code?

1115


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4453


How to find ECC system, GRC system and BI system ?

1224


When would you update a sap table directly? What precautions would you taje?

1211


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2129


How do we test security systems.

1110


What authorization is required to create and maintain user master records?

1100


what is your ticketing tool? can we give some details about how we are getting tickets

1600


How to do Role Design, Testing and Implementation

2506


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1967


how we can see FFID if firefighter not able to see FFids ?

2051


Can wildcards be used in authorizations?

1197


What profile versions?

1181


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2336


What are the most used tables in sap?

1215