After maintaining authorization fields, we save and generate the profile. But it prompts for the profile name right when we click on 'Save' icon. So what is the basic difference between Saving and Profile Generating?9 12499
In 4.7 EE, we have an option as User -> Settings -> Automatic Comparison at Save. Is it right if i say that this option checked will automatically prompt for User cpompare when we simply save the data after entering the users to the role? But whether the option is checked or not i did not get any prompt for User compare on saving the data after entering Users info in the role. My another doubt is whats the difference between User and Complete Compare options. If i dont do complete Compare, wiill that effect? Is it right if i say that User compare assigns the users to the role and Complete Compare updates the user master recoirds , i.e., User master record comparison is current.3 4870
Hello!!! We are asked to generate a report/collect data on users concurrently accessed to the system and what operations they performed with their concurrent access. Apart from they want info on the duration of thier concurrent/normal session (date, time etc). Can anyone help us to know any particular transactions (as of our knowledge STAT & STAD can render certain segment of data), reports available with SAP to collect the above requested info.5 8683
Hi This is Prakash . Can any one tell me what is the use of SU24 and SU25 transaction code exactly8 17489
Hi , Currently i am working in an MNC company as an SAP Security tier1 member , we will take care of User Administration , Profile/authorization administration activities .Could any one tell me , is i am eligible to apply for an SAP Security job for 2 years experience . Could any one tell me about SOD , SOX Audit and Virsa tool , i have never worked before . Prakash
Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?2 10168
what is use of copy data in derived role and when we use this one ???
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Attributes in SE01?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
How to do Role Design, Testing and Implementation
how to do Reporting and Analysis authorizations
how we do CUA configuration in Quality system
what is the process to find that one consultant had removed a table from sap tables
why do create Firefighters and ffids service type user?
Any details about secatt apart from SAPSecurity online.com?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
How to run the daily background job s for virsa violations ? thabks in advance