Answer Posted / vamsi
As far as my knowledge is conserned, A customised T-Code
can be created in dev and transported to production using
STMS. T-Code will be created by ABAP'ers and transported by
Basis team.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Pfcg proposed activities but you need only two. What would you do?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is use of derived roles?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
By which parameter number of entries are controlled in the user buffer?
What are pfud t-codes used for?
What is the difference between the table buffer and the user buffer?
Tell me about derived role?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
What is stad?
As a SAP security consultant what is the most challenged you faced in previous company?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?