Answer Posted / avinash
It is used for generation of profiles for mass number of roles
Is This Answer Correct ? | 17 Yes | 0 No |
Post New Answer View All Answers
how to do Reporting and Analysis authorizations
What are the upgrades happened in GRC 5.3 from GRC 5.2?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How we schedule and administering background jobs?
Differentiate between derived role and composite role
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Support types of WOs you have faced?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Differentiate between temp role and copy role
Explain sap system transactions?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Explain x-glueb and its use in sap security.