Answer Posted / yatin
The question need to be reframed otherwise irrelevant.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What are the different types of sap security tables?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Pfcg proposed activities but you need only two. What would you do?
What is the difference between authorization object and authorization object class?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Can you explain network topology in sap systems?
How to create users?
what is hypercare and go live support?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How to update risk id in rule set?
How to do Role Design, Testing and Implementation
What does the item category specify in a purchasing requisition in SAP Materials Management?