Answer Posted / talat
are you refering to objects by any chance..
if so the following are used
S_User_auth
S-user_pro
s_user_grp
hope that helps
| Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
As a SAP security consultant what is the most challenged you faced in previous company?
how you can delete multiple roles from qa, dev and production system?
Can you explain internet-level security?
By which parameter number of entries are controlled in the user buffer?
Pfcg proposed activities but you need only two. What would you do?
what is authorization object and authorization object class?
What authorization are required to create and maintain user master records?
What are se10 t-codes used for?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What are st01 t-codes used for?
how we do CUA configuration in Quality system
What is use of derived roles?
What does user compare do?