Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How we Check if the PFCG_TIME_DEPENDENCY is running for user
master reconciliations.

Answer Posted / c. sugg

Execute SM37 and search for PFCG_TIME_DEPENDENCY

Is This Answer Correct ?    19 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is use of derived roles?

1302


You want to create and maintain user master record. What authorization would you need?

1247


when performing client copies what steps you need to take from CUA point of view?

2614


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2694


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2429


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1522


could anyone tell me how we can copy the mass roles from sap_all profiles???????

2191


What does the item category specify in a purchasing order in SAP Materials Management?

1435


Explain x-glueb and its use in sap security.

1411


What does the pfcg_time_dependency clean up?

1324


what is centralize FFID?

2150


What is the maximum number of profiles in a role and maximum number of object in a role?

1075


How to assign any program to user?

1698


what is the process to find that one consultant had removed a table from sap tables

2576


Can you explain document transfer-level security?

1205