Answer Posted / karunakar
It is an activity which is carried to determined who can do
what and up to what extend,
| Is This Answer Correct ? | 3 Yes | 1 No |
Post New Answer View All Answers
Which t-code can be used to delete old security audit logs?
What are some ap security t codes?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What are su25 t-codes used for?
When would you update a sap table directly? What precautions would you taje?
What is t code?
Can you explain internet-level security?
Explain protecting public keys?
How can sap security be improved?
How to create users?
What is the use of su56?
What profile versions?
what is user base in sap security?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What are the most used tables in sap?