What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
No Answer is Posted For this Question
Be the First to Post Answer
can we assign roles to user without user master comparison
Which t-code can be used to delete old security audit logs?
What is the t-code used for locking the transaction from execution?
two company codes ex 1001,1002 and two users ,one user need to access both company codes and another user need to access only one company code need to access by giving same role (one role ) to both of them.how can give access or restrict company codes in one role?
what is the procedure to delete a role?
6 Answers Cap Gemini, IBM, iGate,
How to clean the data (users, roles, etc..) from GRC 5.3?
What is sap cryptographic library?
How will you mitigate a user against an authorization object which is decided as sensitive by Business
hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
what is the landscape of GRC
how to we Assigning Portal groups for Business users in BI