Answer Posted / talat
are you refering to objects by any chance..
if so the following are used
S_User_auth
S-user_pro
s_user_grp
hope that helps
| Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
How to do Role Design, Testing and Implementation
How to run the daily background job s for virsa violations ? thabks in advance
Can you explain sap system transactions?
What is sap cryptographic library?
What does the pfcg_time_dependency clean up?
What is audit information system?
What are se10 t-codes used for?
How can I do a mass delete of the roles without deleting the new roles?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Explain transport system-level security?
What happens to change documents when they are transported to the production system?
Can you explain transport system-level security?
What are su25 t-codes used for?
what is the process to find that one consultant had removed a table from sap tables
how you can delete multiple roles from qa, dev and production system?