After maintaining authorization fields, we save and generate the profile. But it prompts for the profile name right when we click on 'Save' icon. So what is the basic difference between Saving and Profile Generating?9 13018
In 4.7 EE, we have an option as User -> Settings -> Automatic Comparison at Save. Is it right if i say that this option checked will automatically prompt for User cpompare when we simply save the data after entering the users to the role? But whether the option is checked or not i did not get any prompt for User compare on saving the data after entering Users info in the role. My another doubt is whats the difference between User and Complete Compare options. If i dont do complete Compare, wiill that effect? Is it right if i say that User compare assigns the users to the role and Complete Compare updates the user master recoirds , i.e., User master record comparison is current.3 5160
Hello!!! We are asked to generate a report/collect data on users concurrently accessed to the system and what operations they performed with their concurrent access. Apart from they want info on the duration of thier concurrent/normal session (date, time etc). Can anyone help us to know any particular transactions (as of our knowledge STAT & STAD can render certain segment of data), reports available with SAP to collect the above requested info.5 9126
Hi This is Prakash . Can any one tell me what is the use of SU24 and SU25 transaction code exactly8 18087
Hi , Currently i am working in an MNC company as an SAP Security tier1 member , we will take care of User Administration , Profile/authorization administration activities .Could any one tell me , is i am eligible to apply for an SAP Security job for 2 years experience . Could any one tell me about SOD , SOX Audit and Virsa tool , i have never worked before . Prakash
Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?2 10616
what is centralize FFID?
How to assign any program to user?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?
what is use of copy data in derived role and when we use this one ???
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Any details about secatt apart from SAPSecurity online.com?
what are the issues you faced with UME?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Support types of WOs you have faced?