Answer Posted / shankarreddy08
We can restrict with the help of Auth.Group(field values:P_Group for Programmes) and this Auth.Group is assigned under the S_Develop and S_programme(optional).
S_develop-> Helps to develop teh programmes.
S_Programme-> Used to execute the programme either in Forground /background
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are su25 t-codes used for?
What does the item category specify in a purchasing requisition in SAP Materials Management?
What is the difference between c (check) and u (unmaintained)?
How we Educated client personnel in R/3 Security and general Basis knowledge
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
You want to remove a developer's and developer keys from a system. How would you do that?
What is the difference between authorization object and authorization object class?
how we can see FFID if firefighter not able to see FFids ?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What is a composite role?
How do you check background jobs?
What are the uses of an authorization group?
what is the main difference between the derived role and a single role?