Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

hi , can any one say what is the exact use of SNC TAB IN
SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF
SECURITY PURPOSE?

Answer Posted / prakash

'SNC' used for externally data security
purpose for ex Data Encryption..., may used to store user
credetials in order to by-pass

it depends on the job of external servers configured for
SNC

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are su25 t-codes used for?

1179


What are su22 t-codes used for?

1088


How to run the daily background job s for virsa violations ? thabks in advance

3610


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1019


What is the maximum number of profiles in a role and maximum number of object in a role?

974


What is the use of su56?

1084


What is the main purpose of parameters, groups & personalization tabs?

1067


Why is it important to delete sap-new profile? What steps will you take to do this?

1083


Support types of WOs you have faced?

2245


What are se10 t-codes used for?

1071


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4212


Differentiate between temp role and copy role

1134


What does the profile generator do?

1068


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2081


List the various user types.

1014