Answer Posted / siddhartha
RSU01
RSD1
RSA1
SE16
RSECADMIN
RSECAUTH
RSCUSTV23
Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What is the difference between the table buffer and the user buffer?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what are the issues you faced with UME?
Explain internet-level security?
How to find ECC system, GRC system and BI system ?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Can you explain secure store and forward?
what is hypercare and go live support?
What are the uses of an authorization group?
How to run the daily background job s for virsa violations ? thabks in advance
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Can you explain network topology in sap systems?
What profile versions?
how we can see FFID if firefighter not able to see FFids ?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help