Answer Posted / amit
By using T_code EWZ5.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is user base in sap security?
Explain network topology in sap systems?
how we can see FFID if firefighter not able to see FFids ?
By which parameter number of entries are controlled in the user buffer?
Pfcg proposed activities but you need only two. What would you do?
What does the item category specify in a purchasing order in SAP Materials Management?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Authorization check on s_btch_job failed. What would happen now?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what is your ticketing tool? can we give some details about how we are getting tickets
Can wildcards be used in authorizations?
Which transaction code is used to display the user buffer?
What are the most used tables in sap?
What are su22 t-codes used for?
What is stad?