Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Could any one tell me "What is critical authorizations in sap security"?

Answer Posted / srini

what about S_ADMI_FCD :) there are many are there we cannot say fixed number :)

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2338


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1683


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2665


how a t code works

2445


what is the different b/w su10 and su12

2985


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4707


When would you update a sap table directly?

1078


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2448


What are su25 t-codes used for?

1248


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1464


What is use of derived roles?

1247


Can you explain internet-level security?

1132


What is sap cryptographic library?

1066


Can you explain snc in sap security?

1166


How to do Role Design, Testing and Implementation

2509