Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

1.Is it possible to have a request type by which we can change
the validity period of a user?
If possible, then what are the actions?

Answer Posted / sree

Any GRC experts?
Every one have only questions. Not gettting any answers from that questions. Please experts help us.
thanks

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1229


How to run the daily background job s for virsa violations ? thabks in advance

3713


when performing client copies what steps you need to take from CUA point of view?

2615


How can I do a mass delete of the roles without deleting the new roles?

1525


What is the use of su56?

1201


You want to remove a developer's and developer keys from a system. How would you do that?

1146


Differentiate between temp role and copy role

1256


Can you explain internet-level security?

1193


Can you explain network topology in sap systems?

1177


How to find out who has deleted users in the system?

1240


Can you explain snc in sap security?

1227


what is user buffer?

1250


What is the maximum number of profiles in a role and maximum number of object in a role?

1076


Explain network topology in sap systems?

1155


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2411