Answer Posted / kishore kumar vuthpala
Dialog (A)
System (B)
Communication (C)
Service (S)
Reference (L)
Is This Answer Correct ? | 23 Yes | 0 No |
Post New Answer View All Answers
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
How to run the daily background job s for virsa violations ? thabks in advance
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Can you explain sap system transactions?
Tell me about derived role?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What does the item category specify in a purchasing requisition in SAP Materials Management?
What are su25 t-codes used for?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What is t code?
Support types of WOs you have faced?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.