Answer Posted / talat
are you refering to objects by any chance..
if so the following are used
S_User_auth
S-user_pro
s_user_grp
hope that helps
Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
Can you explain sap system transactions?
how a t code works
How can I do a mass delete of the roles without deleting the new roles?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Pfcg proposed activities but you need only two. What would you do?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
How we Educated client personnel in R/3 Security and general Basis knowledge
What is Sap security t-codes?
Differentiate between saml token profile and a sap logon ticket
What is the use of Personalization tab in SU01?
When would you update a sap table directly?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Explain document transfer-level security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What is the maximum number of profiles in a role and maximum number of object in a role?