what is CUA ? wat are the steps required to configure it ?
and then hou does it work ?
Answer Posted / abdulhabeeburrahman
1 Creating an Administration user - SU01
2 Setting up logical system - SCC4/SALE
3 Creating system user - SU01
4 creating RFC connection for target system-SM59
5 Creating Central user administration - SCUA6
6 Distributing the created CUA Model to all child systems - BD64
7 Check CUA Model in all the Child system and generate partner profile -
8. checking the partner profile - WE20
9. Setting UP field distribution parameter - SCUM
10. Synchronizing and distributing company address SCUG, SUCOMP
11. Synchronizing user group- SUGR
12 Transferring users from new system SCUM
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
When would you update a sap table directly?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Differentiate between saml token profile and a sap logon ticket
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
what is hypercare and go live support?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What are the upgrades happened in GRC 5.3 from GRC 5.2?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
What authorization are required to create and maintain user master records?
Differentiate between temp role and copy role
what is user base in sap security?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?