Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In which table you can see authorization group for table and
which table to see authorization group for program?

Answer Posted / honey

UNDER THE AUTHORIZATION OBJECT S_PROGRAM

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1100


Can you explain secure store and forward?

1114


Can you explain document transfer-level security?

1205


When would you update a sap table directly? What precautions would you taje?

1267


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3749


Which tables will you use for making customizing setting for security administration?

1230


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1419


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4771


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1152


What are st01 t-codes used for?

1195


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2213


what is user buffer?

1246


Attributes in SE01?

2602


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1104


Can you explain protecting public keys?

1115