how many composite roles can be assigned to a user ?
Post New Answer View All Answers
How to find ECC system, GRC system and BI system ?
What is the difference between authorization object and authorization object class?
Explain document transfer-level security?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Can you explain secure store and forward?
what is the difference between usobt_c and usobx_c?
What is the difference between usobx_c and usobt_c?
What authorization is required to create and maintain user master records?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Explain internet-level security?
What is the use of su56?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?