Answer Posted / prasad
SUIM -Is User information System. This T code is mainly used by SAP security consultants and SAP AUDIT Team. It consists of user and role information. who are having access to T codes, Roles, Profiles, AUTH Objects, last Login . last change document to users, roles and profiles etc.
As per the Audit team requirement - we need to send the report by using SUIM.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Can you explain document transfer-level security?
Explain network topology in sap systems?
What is the use of su56?
Which t-code can be used to delete old security audit logs?
What is sap internet transaction server?
What is the difference between role and a profile?
Can wildcards be used in authorizations?
You want to remove a developer's and developer keys from a system. How would you do that?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What are su53 t-codes used for?
What is sap cryptographic library?
What are some ap security t codes?