Answer Posted / prakash
Normally, we do not have fields specifically for role owner.
Role owner names will maintain in long descriptions
| Is This Answer Correct ? | 0 Yes | 4 No |
Post New Answer View All Answers
what is the process to find that one consultant had removed a table from sap tables
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Tell me about derived role?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Explain network topology in sap systems?
How to run the daily background job s for virsa violations ? thabks in advance
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
What are the most used tables in sap?
What is use of derived roles?
how to do Reporting and Analysis authorizations
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What are su53 t-codes used for?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security