How see hierarchies in BI security
When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?
What are pfud t-codes used for?
how you can delete multiple roles from qa, dev and production system?
How would you do the 'lock all users at once'.
how segregation of duties in sap security?
what is user buffer?
Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is Sap security t-codes?
what is routing rule , give one example?
1. what is the difference b/w change authorization mode and expert mode. 2.when we do the user comparison in pfcg what is the difference in complete comparison and expert mode comparison. 3. what are the critical auth objects in security point of you , 4.when we do the transportation of composite role what will happened . 5.while doing the kernel upgrade we download the executable s one by one are all together. 6. while applying the patches what is the importance of test import why we do test import
what are ticketing tools?