under description ; in creating a role what should be
written over there ....what does ur company follows ??
Answer Posted / jhun
To add more, in the decription area, you can write the
history on why the role has been created and the approval
from the business. You can also add the request number for
the creation of that particular role. In other words,
detailed information should be in place.
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
what is the process to find that one consultant had removed a table from sap tables
What is a composite role?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Can you explain sap system transactions?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What are the different types of sap security tables?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Any details about secatt apart from SAPSecurity online.com?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
How we Provided Security design, configuration, and support for SAP Enterprise Portals
What are pfud t-codes used for?
what are the issues you faced with UME?
How can sap security be improved?