Which of below authorization object that protect transaction
code execution?
A. S_TCODE
B. P_TCODE
C. Q_TCODE
D. X_TCODE
Answer Posted / pandu
arrey holey
tell the answer
arrey oh.....guest salley
Is This Answer Correct ? | 1 Yes | 4 No |
Post New Answer View All Answers
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Why is it important to delete sap-new profile? What steps will you take to do this?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
how you can delete multiple roles from qa, dev and production system?
What happens to change documents when they are transported to the production system?
How we Educated client personnel in R/3 Security and general Basis knowledge
Can you explain document transfer-level security?
What are su25 t-codes used for?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is audit information system?
Can you explain protecting public keys?
How do we test security systems.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
User is not there in User master record. Then how to trace the user?