Answer Posted / re
go to se37
enter the function module name sccr lock client
| Is This Answer Correct ? | 7 Yes | 1 No |
Post New Answer View All Answers
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
In pfcg where we can add customized t-codes. And where we can see customized t-codes
What authorization is required to create and maintain user master records?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How to run the daily background job s for virsa violations ? thabks in advance
Explain snc in sap security?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
How to find ECC system, GRC system and BI system ?
How do we test security systems.
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
How to find out who has deleted users in the system?
how we Set up Central User Administration (CUA) to manage 4 systems/clients