SAP Security & GRC made easy

SAP Security Questions & Answers

January 22, 2020 0
SAP Security Questions & Answers 1. Explain with an example where SAP ERP comes in picture? 2. Can we put composite role in a composite...

SAP Security Audit

January 22, 2020 0
Below are the points based on SAP Security audit more or less which covers the basic points. It also depends from company to company. ...

Implementation phases

January 22, 2020 0
ASAP ( Accelerated SAP) is one of the important SDLC used in SAP implementation projects. There are six phases of a implementation pro...

SU25 - profile upgradation

January 22, 2020 0
There are 6 different steps in this transaction code . Step 1 : Initially fill the customer tables - The first step is to fill the...

Role administration

January 22, 2020 0
Roles  contains the authorizations that users can use to access the transactions, reports, Web-based applications, and so on that are cont...

User administration - SU01

January 21, 2020 0
User administration is creation and maintenance of the users by the system admisitrator to administer the rights for the individual users ...

Architecture of SAP ERP

January 21, 2020 0
History of SAP ERP R1  architecture ( R stands for Real-time and 1 stands for 1-tier or 1 layer) there was only the Database layer. ...

Introduction - SAP ERP

January 21, 2020 0
SAP (Systems Applications and Products) -SAP is also name of the ERP(Enterprise Resource Planning) and also the name of the company. ...

SAP Security Tcodes

January 21, 2020 0
User administration Tcodes SU01       - User maintenance SU01D    - Display user SU10       - User Mass maintenance SU02       - Ma...

SAP Security Tables

January 21, 2020 0
Security Tables Usr*     - tables that contains User Master information Agr*    - tables that contains Roles information USH*   - tab...