Answer Posted / yatin
The question need to be reframed otherwise irrelevant.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Differentiate between derived role and composite role
what is user base in sap security?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the difference between role and a profile?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Can you explain protecting public keys?
When would you update a sap table directly?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is audit information system?
explain the personalization tab within a role?
What does the item category specify in a purchasing order in SAP Materials Management?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
When would you update a sap table directly? What precautions would you taje?