i am asked to get through at "Authorizations analysis and
correct assignments" wat does it mean and wat all concepts
comes under these ?
Answer Posted / vamshi
no, it is not; it is in releate to r/3 authorization it
self.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
You want to remove a developer's and developer keys from a system. How would you do that?
What is sap’s grc?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Explain protecting public keys?
What is the procedure for role modifications?
Can wildcards be used in authorizations?
How to update risk id in rule set?
what things you have to take care before executing run system trace?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What are the different types of sap security tables?
How to codify for an Item in SAP? How many digits are required for an item?
Explain sap system transactions?
How to find ECC system, GRC system and BI system ?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Can you explain secure store and forward?