Answer Posted / sudha
SE16 N:Edit SAP tables
SM31 - Table Maintenance
| Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
What is use of derived roles?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What is sap cryptographic library?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
what is sod in sap security?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Pfcg proposed activities but you need only two. What would you do?
what is the critical issue u are faced in your previous experience
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
what things you have to take care before executing run system trace?