Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)
CTS,
1 6629What is the main purpose of Parameters, Groups & Personalization tabs in SU01 and Miniapps in PFCG? thanks in advance
1 34051What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
4526Scheduled a job for user master reconciliation , a user is in a validity date and roles assigned to that user are in validity date, but for reasons roles has been removed from the user master record, what could be the reason, this is not related to position based security, could some explain?
2 7197under description ; in creating a role what should be written over there ....what does ur company follows ??
IBM,
10 14229How to find the already locked users list before a particular date. Example: list of users already locked before 25.03.2010
2 10860When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?
2 8267What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?
3 12230Is there any transaction to see Transport Log. Means, Which data or roles have been transported from which system at what time ?
3 9021Post New SAP Security Questions
How to assign any program to user?
what is the different b/w su10 and su12
what is centralize FFID?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
What are su53 t-codes used for?
How can I do a mass delete of the roles without deleting the new roles?
Which transaction code is used to display the user buffer?
What are the different types of sap security tables?
How to create users?
What happens to change documents when they are transported to the production system?
User is not there in User master record. Then how to trace the user?
What appears as the last sentence in sap note 587410?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS