Answer Posted / syed mahboob feroz ahmed
Hi,
We have Single User and Mass Users.Where Single User
contains whole User Information and Mass Users contain only
user information.
| Is This Answer Correct ? | 0 Yes | 24 No |
Post New Answer View All Answers
Can wildcards be used in authorizations?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Which t-code can be used to delete old security audit logs?
what is authorization object and authorization object class?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How to assign any program to user?
What are su22 t-codes used for?
What does the item category specify in a purchasing requisition in SAP Materials Management?
How we Educated client personnel in R/3 Security and general Basis knowledge
What are the uses of an authorization group?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
How can sap security be improved?
what is sod in sap security?
Explain secure store and forward?