Answer Posted / sayali
User buffer limit can be decided by parameter auth/auth_Number_IN_USERBUFFER
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Explain x-glueb and its use in sap security.
what is use of copy data in derived role and when we use this one ???
what is sod in sap security?
What is a composite role?
User is not there in User master record. Then how to trace the user?
How to codify for an Item in SAP? How many digits are required for an item?
what are all the questions covered in "profiles related concepts " please let me know ?
Can wildcards be used in authorizations?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
How to update risk id in rule set?
Why is it important to delete sap-new profile? What steps will you take to do this?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
How we schedule and administering background jobs?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What does user compare do?