Answer Posted / pritam
Through the user type 'reference' user
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
Can you explain internet-level security?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Explain document transfer-level security?
What does the profile generator do?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is the use of su56?
what is user buffer?
what is the use of defaults tab in start menu
how a t code works
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.