1.Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
2 12442Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help
2 7741whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
IBM,
3 15055Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
IBM,
3641How to check to which web links user has access ? bcoz its not there any option in SUIM for this search and we add web links/reports while creating role. So how to check that ?
2 7577Post New SAP Security Questions
Explain x-glueb and its use in sap security.
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is t code?
Can you explain document transfer-level security?
How can sap security be improved?
how to do Reporting and Analysis authorizations
what is the difference between usobt_c and usobx_c?
What is the maximum number of profiles in a role and maximum number of object in a role?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What is sap cryptographic library?
Can you explain snc in sap security?
Explain snc in sap security?
how you can delete multiple roles from qa, dev and production system?
What is the difference between role and a profile?