Answer Posted / krishna
6. To add to the above points we need to consider the SU24 changes as well.
7. Take all the required approvals from the respective stakeholders before moving the changes to Quality system for testing. To avoid any further changes.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is the difference between the table buffer and the user buffer?
what is sod in sap security?
What are some ap security t codes?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How to find out who has deleted users in the system?
How to find ECC system, GRC system and BI system ?
Explain network topology in sap systems?
How we Educated client personnel in R/3 Security and general Basis knowledge
What is Sap security t-codes?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
What authorization is required to create and maintain user master records?
How do we test security systems.
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Why is it important to delete sap-new profile? What steps will you take to do this?