Answer Posted / pritam
Through the user type 'reference' user
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
What are the uses of an authorization group?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How can sap security be improved?
what is the process to find that one consultant had removed a table from sap tables
How to run the daily background job s for virsa violations ? thabks in advance
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What are su22 t-codes used for?
Why is it important to delete sap-new profile? What steps will you take to do this?
What does the pfcg_time_dependency clean up?
what is centralize FFID?
How to update risk id in rule set?
What is sap cryptographic library?
Explain document transfer-level security?
Explain snc in sap security?
Any details about secatt apart from SAPSecurity online.com?