Answer Posted / gaurav
One can also use "Authorization Data" functionality in
transaction SU10 to complete this task.
| Is This Answer Correct ? | 19 Yes | 0 No |
Post New Answer View All Answers
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how we can see FFID if firefighter not able to see FFids ?
how you can delete multiple roles from qa, dev and production system?
how we do CUA configuration in Quality system
Pfcg proposed activities but you need only two. What would you do?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is t code?
When would you update a sap table directly?
Can you explain network topology in sap systems?
what are the issues you faced with UME?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Differentiate between saml token profile and a sap logon ticket
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?