Answer Posted / krishna
derived roles are commonly used
if not let me know
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
What are the uses of an authorization group?
Can you explain document transfer-level security?
You want to remove a developer's and developer keys from a system. How would you do that?
What is the difference between usobx_c and usobt_c?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
what is the use of defaults tab in start menu
What is the use of tmssup* rfc destinations?
Is it possible to change role template? How?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
When would you update a sap table directly?
What does the pfcg_time_dependency clean up?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
How we schedule and administering background jobs?