Is SU25 step(2nd) is mandatory when SAP up-gradation happened?
Answer Posted / kondreddi.raghu
Step 2B is important because . It will give information about list of authorization objects which are checked YES and which are checked NO . Based on this information we can take take decision which authorization objects can be can be we keep while adding a particular TCODE
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
what is centralize FFID?
Explain internet-level security?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Any details about secatt apart from SAPSecurity online.com?
Pfcg proposed activities but you need only two. What would you do?
What is the difference between the table buffer and the user buffer?
What authorization are required to create and maintain user master records?
What is the maximum number of profiles in a role and maximum number of object in a role?
What profile versions?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.