SU24 must be set up before implementing any roles.
A. True
B. False
Answer Posted / karunakar
It is False
with SU24 we can find the relationship between Tcode and
auth objects,
Please correct me if i am wrong
| Is This Answer Correct ? | 3 Yes | 3 No |
Post New Answer View All Answers
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Explain snc in sap security?
As a SAP security consultant what is the most challenged you faced in previous company?
what things you have to take care before executing run system trace?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
What are su25 t-codes used for?
What happens to change documents when they are transported to the production system?
List the various user types.
Can you explain sap system transactions?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are se10 t-codes used for?
What is sap cryptographic library?
What are the most used tables in sap?
Can you explain protecting public keys?
Which tables will you use for making customizing setting for security administration?