Answer Posted / shilpa
Table auth groups are created through tcode SE54
program auth groups are created in table TPGP through tcode
SM30
Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Support types of WOs you have faced?
What does user compare do?
Authorization check on s_btch_job failed. What would happen now?
what is centralize FFID?
Can you explain document transfer-level security?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
what are all the questions covered in "profiles related concepts " please let me know ?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
what things you have to take care before executing run system trace?
What are se10 t-codes used for?
how we can see FFID if firefighter not able to see FFids ?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What are su22 t-codes used for?