Answer Posted / ravi
GRC DEV and GRC Production
Is This Answer Correct ? | 4 Yes | 3 No |
Post New Answer View All Answers
Differentiate between usobx_c and usobt_c
What are some ap security t codes?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can you explain internet-level security?
User is not there in User master record. Then how to trace the user?
what is the use of defaults tab in start menu
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
what is the critical issue u are faced in your previous experience
What is the procedure for role modifications?
What are su22 t-codes used for?