Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Is it every login FFID notification goes to controller?

Answer Posted / somesh

Every FFID under monitoring of controller. This is configure at SPRO and set the parameter as 4008-Yes (Send FirefightId Login Notification)

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is authorization object and authorization object class?

1245


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1036


How to do Role Design, Testing and Implementation

2498


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3186


How can I do a mass delete of the roles without deleting the new roles?

1439


How do we test security systems.

1094


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1171


You want to remove a developer's and developer keys from a system. How would you do that?

1080


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4437


What is the use of Personalization tab in SU01?

5659


how we do CUA configuration in Quality system

2411


Can you explain protecting public keys?

1045


How to find out who has deleted users in the system?

1149


By which parameter number of entries are controlled in the user buffer?

1373


How to assign any program to user?

1591