Answer Posted / rohitha
Description
Menu
Authorization
User
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Explain document transfer-level security?
Can you explain protecting public keys?
What is the difference between the table buffer and the user buffer?
Tell me about derived role?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can you explain secure store and forward?
How we schedule and administering background jobs?
How to find ECC system, GRC system and BI system ?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What is the difference between authorization object and authorization object class?
What is use of derived roles?
when performing client copies what steps you need to take from CUA point of view?
What are su22 t-codes used for?
What are some ap security t codes?