After maintaining authorization fields, we save and generate the profile. But it prompts for the profile name right when we click on 'Save' icon. So what is the basic difference between Saving and Profile Generating?9 12660
In 4.7 EE, we have an option as User -> Settings -> Automatic Comparison at Save. Is it right if i say that this option checked will automatically prompt for User cpompare when we simply save the data after entering the users to the role? But whether the option is checked or not i did not get any prompt for User compare on saving the data after entering Users info in the role. My another doubt is whats the difference between User and Complete Compare options. If i dont do complete Compare, wiill that effect? Is it right if i say that User compare assigns the users to the role and Complete Compare updates the user master recoirds , i.e., User master record comparison is current.3 4977
Hello!!! We are asked to generate a report/collect data on users concurrently accessed to the system and what operations they performed with their concurrent access. Apart from they want info on the duration of thier concurrent/normal session (date, time etc). Can anyone help us to know any particular transactions (as of our knowledge STAT & STAD can render certain segment of data), reports available with SAP to collect the above requested info.5 8808
Hi This is Prakash . Can any one tell me what is the use of SU24 and SU25 transaction code exactly8 17697
Hi , Currently i am working in an MNC company as an SAP Security tier1 member , we will take care of User Administration , Profile/authorization administration activities .Could any one tell me , is i am eligible to apply for an SAP Security job for 2 years experience . Could any one tell me about SOD , SOX Audit and Virsa tool , i have never worked before . Prakash
Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?2 10304
I create one BRF+ rule and captured in TR while releasing TR , I am getting error , WHy?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How to do Role Design, Testing and Implementation
what is hypercare and go live support?
what is the process to find that one consultant had removed a table from sap tables
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
how we can see FFID if firefighter not able to see FFids ?
why do create Firefighters and ffids service type user?
Which transaction should not be given to BASIS and DEV team in Production?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects