Answer Posted / raju
Authorization profile is combination of Authorization objects.
when u creating a role Authorization profile gets created.
Authorization object is group of not more than 10
Authorization fields.
Authorization field is least value in sap it need to be protect.
| Is This Answer Correct ? | 1 Yes | 3 No |
Post New Answer View All Answers
How to assign any program to user?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
What are su56 t-codes used for?
How to insert missing authorization?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Can you explain protecting public keys?
what are all the questions covered in "profiles related concepts " please let me know ?
How to find ECC system, GRC system and BI system ?
what is centralize FFID?
You want to create and maintain user master record. What authorization would you need?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
how we Set up Central User Administration (CUA) to manage 4 systems/clients
Explain x-glueb and its use in sap security.
You want to remove a developer's and developer keys from a system. How would you do that?