Answer Posted / naresh nelluri
SOD is nothing but roles and responsibulites along with
positions.
| Is This Answer Correct ? | 3 Yes | 8 No |
Post New Answer View All Answers
As a SAP security consultant what is the most challenged you faced in previous company?
how we do CUA configuration in Quality system
Why is it important to delete sap-new profile? What steps will you take to do this?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Explain secure store and forward?
How to assign any program to user?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is use of derived roles?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
what is the process to find that one consultant had removed a table from sap tables
List the various user types.
Differentiate between derived role and composite role