Answer Posted / ram
instead of that we can assign profile, which is already existed role having desired t-code
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
As a SAP security consultant what is the most challenged you faced in previous company?
what is sod in sap security?
what is authorization object and authorization object class?
Any details about secatt apart from SAPSecurity online.com?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
In pfcg where we can add customized t-codes. And where we can see customized t-codes
When would you update a sap table directly? What precautions would you taje?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What is sap cryptographic library?
How to assign any program to user?
Explain sap system transactions?
How to run the daily background job s for virsa violations ? thabks in advance
what is the difference between usobt_c and usobx_c?
what things you have to take care before executing run system trace?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS