Post New Answer View All Answers
Explain secure store and forward?
What is the difference between authorization object and authorization object class?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What are the most used tables in sap?
What are se09 t-codes used for?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is the use of su56?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Can you explain document transfer-level security?
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
In pfcg where we can add customized t-codes. And where we can see customized t-codes
What are su53 t-codes used for?