Answer Posted / priyanka gadge
Via transaction EWZ5
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
As a SAP security consultant what is the most challenged you faced in previous company?
What is sap internet transaction server?
how to do Reporting and Analysis authorizations
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What are some ap security t codes?
how you can delete multiple roles from qa, dev and production system?
what is centralize FFID?
Tell me about derived role?
What is a composite role?
what is the difference between usobt_c and usobx_c?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What does the item category specify in a purchasing requisition in SAP Materials Management?