Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What does SAP recommend regarding the RFC naming convention?

Answer Posted / gurunatha rao t

Let me elaborate the above answer:

Actual recommendation is {SID}CLNT{XXX}

In the above answer it is GRC-SID,
XXX- 100

where SID is System Identifier,
XXX is the client number

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Differentiate between usobx_c and usobt_c

1144


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1461


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2705


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

2077


what is the use of defaults tab in start menu

1875


What does the pfcg_time_dependency clean up?

1243


What does the item category specify in a purchasing requisition in SAP Materials Management?

1506


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2441


Any details about secatt apart from SAPSecurity online.com?

2294


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2061


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4440


As a SAP security consultant what is the most challenged you faced in previous company?

1091


Differentiate between derived role and composite role

1153


Which t-code can be used to delete old security audit logs?

1468


Can you explain protecting public keys?

1045