Answer Posted / muthu
I hope there is no limit for user buffer now a days. N.no of authorization can perform a user.
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is sap cryptographic library?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Explain snc in sap security?
how you can delete multiple roles from qa, dev and production system?
What is the use of su56?
How to update risk id in rule set?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
what is the critical issue u are faced in your previous experience
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
when performing client copies what steps you need to take from CUA point of view?