In which table you can see authorization group for table and which table to see authorization group for program?
8 37294Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 19908Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
ABC,
4210Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
ABC,
3643Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16383Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
HP,
2 14251Post New SAP Security Questions
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What does the account assessment category specify in a purchasing document in SAP Materials Management?
what are the issues you faced with UME?
Can you explain internet-level security?
How to assign any program to user?
How to insert missing authorization?
when performing client copies what steps you need to take from CUA point of view?
Pfcg proposed activities but you need only two. What would you do?
What is t code?
What is the difference between c (check) and u (unmaintained)?
Which tables will you use for making customizing setting for security administration?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are the uses of an authorization group?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.