Hii...
Any one tell me ..
We are using mainly 2 T.R.
1.customizing request.
2.work bench request.
Can u tell me ..which are comes under customizing request and which are work bench request
Answer / subodh
The customizing TR are client dependent configurations while the workbench TR are Client independent. Most configurations are Customizing while ABAP changes are workbench
Is This Answer Correct ? | 0 Yes | 0 No |
I create one BRF+ rule and captured in TR while releasing TR , I am getting error , WHy?
What are the issues will face while creating user in the system ?
What authorization is required to create and maintain user master records?
What does user compare do?
what is the difference in grc background jobs
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?
Scheduled a job for user master reconciliation , a user is in a validity date and roles assigned to that user are in validity date, but for reasons roles has been removed from the user master record, what could be the reason, this is not related to position based security, could some explain?
what is the difference between BI AND BW security
In pfcg where we can add customized t-codes. And where we can see customized t-codes