Answer Posted / knreddy
thorugh mail or tool like remedy .....
| Is This Answer Correct ? | 10 Yes | 0 No |
Post New Answer View All Answers
Which transaction code is used to display the user buffer?
Authorization check on s_btch_job failed. What would happen now?
what is your ticketing tool? can we give some details about how we are getting tickets
How to find out who has deleted users in the system?
Explain secure store and forward?
what is the different b/w su10 and su12
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Can you explain transport system-level security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How can I do a mass delete of the roles without deleting the new roles?
What authorization are required to create and maintain user master records?
What are the uses of an authorization group?
What is the difference between usobx_c and usobt_c?
How can sap security be improved?