What are the steps involved in SAP Security upgradation
projects and also in SAP security impletation projects
No Answer is Posted For this Question
Be the First to Post Answer
how do we test security systems.what is the use of SU56
What is difference between BW and BI Security?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What is the difference between c (check) and u (unmaintained)?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Any details about secatt apart from SAPSecurity online.com?
Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?
If we have UK roles in our system and we want to find the AUS australian role how you will find the same
What is the maximum number of authorization objects in a role?
what is the advantage of cua from a layman/manager point of view?
(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?