How to approach as a security consultant when a custom t code is created?
Answer Posted / neelima
Whenever a new custom TCode is created, it has been communicated to security so that auth + field values can be maintained in SU24.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the different types of sap security tables?
What appears as the last sentence in sap note 587410?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
What are the uses of an authorization group?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
what are all the questions covered in "profiles related concepts " please let me know ?
What does the pfcg_time_dependency clean up?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
You want to create and maintain user master record. What authorization would you need?
When would you update a sap table directly?
Explain snc in sap security?
How we Educated client personnel in R/3 Security and general Basis knowledge
What is stad?