SAP SECURITY Training in Hyderbad,contact 7893255000.
R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
Answer Posted / sa
contact 7893255000
Is This Answer Correct ? | 3 Yes | 2 No |
Post New Answer View All Answers
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What is the difference between authorization object and authorization object class?
By which parameter number of entries are controlled in the user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
When would you update a sap table directly? What precautions would you taje?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
What is the use of su56?
Pfcg proposed activities but you need only two. What would you do?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
what is the main difference between the derived role and a single role?
What are the uses of an authorization group?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is a composite role?