How to approach as a security consultant when a custom t code is created?
Answer Posted / neelima
Whenever a new custom TCode is created, it has been communicated to security so that auth + field values can be maintained in SU24.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Attributes in SE01?
Explain secure store and forward?
Pfcg proposed activities but you need only two. What would you do?
What authorization are required to create and maintain user master records?
what is centralize FFID?
Can you explain document transfer-level security?
What are su25 t-codes used for?
what is the difference between usobt_c and usobx_c?
What are su53 t-codes used for?
As a SAP security consultant what is the most challenged you faced in previous company?
What profile versions?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What appears as the last sentence in sap note 587410?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?