Answer Posted / anishi kuma
tcode:STMS
| Is This Answer Correct ? | 3 Yes | 4 No |
Post New Answer View All Answers
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Can you explain protecting public keys?
What is the difference between c (check) and u (unmaintained)?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Is it possible to change role template? How?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What are the most used tables in sap?
Any details about secatt apart from SAPSecurity online.com?
What are su22 t-codes used for?
What does the pfcg_time_dependency clean up?
Can you explain transport system-level security?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
How to update risk id in rule set?