Answer Posted / talat
are you refering to objects by any chance..
if so the following are used
S_User_auth
S-user_pro
s_user_grp
hope that helps
| Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
How to assign any program to user?
Which transaction should not be given to BASIS and DEV team in Production?
Can you explain secure store and forward?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
User is not there in User master record. Then how to trace the user?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Tell me about derived role?
What are pfud t-codes used for?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What is the use of tmssup* rfc destinations?
what is the process to find that one consultant had removed a table from sap tables
what are all the questions covered in "profiles related concepts " please let me know ?
What happens to change documents when they are transported to the production system?
By which parameter number of entries are controlled in the user buffer?
How to find ECC system, GRC system and BI system ?