Archive for March 2014
Enterprise security ultimate guide
1. What is Nessus scanner ?
2. Active directory
3. Groundworks
4. Encryption basics
5. Data usage policy
6. Internal controls
7. Access security
8.
Enterprise security ultimate guide
Posted by Unknown
SAP security - keyword weightage
Keyword | Avg. monthly searches |
sap security | 720 |
sap security jobs | 480 |
sap security training | 260 |
sap security interview questions | 140 |
sap security certification | 110 |
sap security tables | 50 |
sap security analyst | 50 |
sap security resume | 50 |
sap security salary | 40 |
sap security tcodes | 30 |
sap security interview questions and answers | 30 |
sap security consultant | 30 |
sap security transactions | 20 |
sap security wiki | 20 |
sap security manager | 20 |
sap security contract jobs | 20 |
sap security guide | 20 |
sap security pages | 20 |
sap security notes | 20 |
sap security online training | 20 |
sap security roles | 20 |
sap security best practices | 20 |
sap security basics | 20 |
sap security analyst salary | 20 |
sap security training online | 20 |
sap security pdf | 20 |
sap security administrator | 20 |
sap security implementation guide | 10 |
sap security jobs in india | 10 |
sap security jobs salary | 10 |
sap security jobs in singapore | 10 |
sap security implementation steps | 10 |
sap security jobs in california | 10 |
sap security interview questions pdf | 10 |
sap security interview | 10 |
sap security interview questions and answers pdf | 10 |
sap security log transaction | 10 |
sap security implementation plan | 10 |
sap security info | 10 |
sap security hr | 10 |
sap security help | 10 |
sap security openings | 10 |
sap security material | 10 |
sap security optimization service | 10 |
sap security online training hyderabad | 10 |
sap security optimization | 10 |
sap security online | 10 |
sap security overview | 10 |
sap security objects | 10 |
sap security module | 10 |
sap security material with screenshots | 10 |
sap security job description | 10 |
sap security manager jobs | 10 |
sap security model | 10 |
sap security learning guide | 10 |
sap security lead | 10 |
sap security log | 10 |
sap security jobs in us | 10 |
sap security jobs in dubai | 10 |
sap security jobs in canada | 10 |
sap security books for beginners | 10 |
sap security definition | 10 |
sap security consultant salary | 10 |
sap security courses | 10 |
sap security consultant resume | 10 |
sap security concepts | 10 |
sap security controls | 10 |
sap security consultant jobs | 10 |
sap security clearance | 10 |
sap security basics ppt | 10 |
sap security design | 10 |
sap security best practices procedures | 10 |
sap security basic concepts | 10 |
sap security book | 10 |
sap security and risk management | 10 |
sap security architecture | 10 |
sap security architect | 10 |
sap security audit log | 10 |
sap security analyst job description | 10 |
sap security jobs in texas | 10 |
sap security faqs | 10 |
sap security guidelines | 10 |
sap security grc jobs in india | 10 |
sap security guide pdf | 10 |
sap security grc ppt | 10 |
sap security grc interview questions | 10 |
sap security grc | 10 |
sap security framework | 10 |
sap security forum | 10 |
sap security for beginners | 10 |
sap security grc jobs | 10 |
sap security for dummies | 10 |
sap security ebook | 10 |
sap security exam | 10 |
sap security engineer | 10 |
sap security expert | 10 |
sap security entry level jobs | 10 |
sap security documents pdf | 10 |
sap security discussion forums | 10 |
sap security documents | 10 |
sap security testing | 10 |
sap security role matrix | 10 |
sap security remote jobs | 10 |
sap security solution partners llp | 10 |
sap security sample resume | 10 |
sap security strategy document | 10 |
sap security specialist | 10 |
sap security settings | 10 |
sap security support jobs | 10 |
sap security services | 10 |
sap security trace | 10 |
sap security training videos | 10 |
sap security training material | 10 |
sap security openings in hyderabad | 10 |
sap security upgrade | 10 |
sap security user administration | 10 |
sap security upgrade guide | 10 |
sap security upgrade ecc 6.0 | 10 |
sap security videos | 10 |
sap security video tutorial free | 10 |
sap security weaver | 10 |
sap security white paper | 10 |
sap security with grc | 10 |
sap gui security theme.xml | 10 |
sap security resume 2 years experience | 10 |
sap security resume 3 years experience | 10 |
sap security questions | 10 |
sap security policy | 10 |
sap security questions and answers | 10 |
sap security patches | 10 |
sap security profile | 10 |
sap security quiz | 10 |
sap security project plan | 10 |
sap security openings in bangalore | 10 |
sap security parameters | 10 |
sap security part time jobs | 10 |
sap security patch day | 10 |
Posted by Unknown
SAP Security keyword research
sap security |
sap security jobs |
sap security training |
sap security tables |
sap security certification |
sap security interview questions |
sap security analyst |
sap security salary |
sap security resume |
sap security transactions |
sap security jobs in texas |
sap security analyst job description |
sap security audit log |
sap security administrator |
sap security architect |
sap security architecture |
sap security analyst salary |
sap security and risk management |
sap security architect job description |
sap security acknowledgements |
sap security basics |
sap security best practices |
sap security book |
sap security background jobs |
sap security basic concepts |
sap security blueprint template |
sap security blueprint doc |
sap security best practices procedures |
sap security books for beginners |
sap security basics ppt |
sap security consultant |
sap security clearance |
sap security consultant jobs |
sap security controls |
sap security concepts |
sap security consultant resume |
sap security courses |
sap security consultant salary |
sap security contract jobs |
sap security definition |
sap security design |
sap security documents |
sap security design approach |
sap security discussion forums |
sap security deloitte |
sap security description |
sap security daily activities |
sap security documents pdf |
sap security dubai |
sap security entry level jobs |
sap security expert |
sap security engineer |
sap security exam |
sap security exam code |
sap security ebook |
sap security essentials jim stewart pdf |
sap security ecc 6.0 |
sap security exercises |
sap security for dummies |
sap security faqs |
sap security for beginners |
sap security free online training |
sap security fresher resume |
sap security forum |
sap security future |
sap security freelance jobs |
sap security framework |
sap security fundamentals |
sap security guide |
sap security grc |
sap security grc interview questions |
sap security grc ppt |
sap security guide pdf |
sap security grc jobs in india |
sap security guidelines |
sap security grc jobs |
sap security grc jobs in uk |
sap security grc certification |
sap security help |
sap security hyderabad |
sap security hr interview questions |
sap security hierarchy |
sap security hr authorizations |
sap security handbook |
sap security hr |
sap security hourly rate |
sap security houston |
sap security hardening |
sap security interview questions and answers |
sap security indeed |
sap security info |
sap security implementation plan |
sap security implementation guide |
sap security interview questions and answers pdf |
sap security interview |
sap security interview questions pdf |
sap security implementation steps |
sap security jobs in singapore |
sap security jobs in india |
sap security jobs salary |
sap security jobs in california |
sap security job description |
sap security jobs in canada |
sap security jobs in dubai |
sap security jobs in us |
sap security key entry for the system is invalid |
sap security kpmg |
sap security kpi |
sap security kt plan |
sap security knowledge |
sap security key |
sap security key entry for the system |
sap security krakow |
sap km security |
sap kernel security |
sap security log |
sap security log transaction |
sap security linkedin |
sap security level |
sap security lead |
sap security london |
sap security learning guide |
sap security library |
sap security manager |
sap security manager salary |
sap security module |
sap security model |
sap security manager jobs |
sap security matrix template |
sap security manager job description |
sap security material |
sap security material with screenshots |
sap security methodology |
sap security notes |
sap security notes pdf |
sap security notes transaction |
sap security news |
sap security network layer (snc) error |
sap security netweaver |
sap security new zealand |
sap security nj |
sap security negative testing |
sap security network layer error |
sap security objects |
sap security online training |
sap security overview |
sap security online |
sap security optimization |
sap security online training hyderabad |
sap security optimization service |
sap security openings |
sap security openings in bangalore |
sap security openings in hyderabad |
sap security pages |
sap security parameters |
sap security pdf |
sap security patches |
sap security policy |
sap security pay scale |
sap security profile |
sap security patch day |
sap security part time jobs |
sap security project plan |
sap security questions |
sap security questions and answers |
sap security quiz |
sap security qatar |
sap security questions pdf |
sap security qualifications |
sap security queries |
sap security q&a |
sap security questions certification |
sap security qlikview |
sap security roles |
sap security role matrix |
sap security role redesign |
sap security role creation |
sap security remote work |
sap security remote jobs |
sap security richmond va |
sap security role transaction |
sap security responsibilities |
sap security solution partners llp |
sap security sample resume |
sap security strategy document |
sap security specialist |
sap security support |
sap security settings |
sap security support jobs |
sap security services |
sap security storage location |
sap security training online |
sap security tcodes |
sap security trace |
sap security training videos |
sap security tables pdf |
sap security training material |
sap security testing |
sap security upgrade |
sap security user types |
sap security user administration |
sap security user comparison |
sap security uk |
sap security upgrade documents |
sap security upgrade resume |
sap security upgrade from 4.7 to ecc 6.0 |
sap security upgrade guide |
sap security upgrade ecc 6.0 |
sap security videos |
sap security vulnerabilities |
sap security videos youtube |
sap security virsa tool |
sap security vs sap basis |
sap security video tutorial free |
sap security vacancy |
sap security video training |
sap security viewer |
sap security vulnerabilities metrics and threats |
sap security wiki |
sap security walkins in hyderabad |
sap security weaver |
sap security walkins |
sap security workshop |
sap security white paper |
sap security walkins in bangalore |
sap security with grc |
sap security work from home |
sap security websites |
sap security x |
sap xi security guide |
sap xi security roles |
sap xmii security |
sap pi/xi security |
sap gui security theme.xml |
xpandion sap security |
xpansion sap security |
sap security theme.xml |
sap security youtube |
sap security new york |
sap security jobs yorkshire |
sap security training youtube |
sap security resume 2 years experience |
sap security resume 3 years experience |
sap security jobs new york |
sap security resume 5 years experience |
sap security zones |
sap security zertifizierung |
sap portal security zones |
sap security jobs new zealand |
sap security jobs in zurich |
sap security openings in new zealand |
zertifikat sap security |
Posted by Unknown
20 key sap security transactions
Given below is a list of 20 key sap security transactions.
Transaction | Area | Sub area |
SP01 | Output Controller Basis | Print and Output Management |
SP02 | Display Spool Requests Basis | Print and Output Management |
PFCG | Role Maintenance Basis | Authorization and Role Management |
SU01 | User Maintenance Basis | User and Authorization Management |
SU24 | Auth. Obj. Check Under Transactions Basis | Authorization and Role Management |
SM20 | Analysis of Security Audit Log Basis | Security |
SM19 | Security Audit Configuration Basis | Security |
SU25 | Upgrade Tool for Profile Generator Basis | Authorization and Role Management |
SM59 | RFC Destinations (Display/Maintain) Basis | RFC |
SU53 | Evaluate Authorization Check Basis | User and Authorization Management |
ST01 | System Trace Basis | Low Level Layer |
RSECADMIN | Manage Analysis Authorizations BW | OLAP Technology |
SE16 | Data Browser Basis | Workbench Utilities |
SE38 | ABAP Editor Basis | ABAP Editor |
SUIM | User Information System Basis | User and Authorization Management |
SM30 | Call View Maintenance Basis | Table Maintenance Tool |
WCM | Work Clearance Management PM | Work Clearance Management |
SICF | HTTP Service Hierarchy Maintenance Basis | Internet Communication Framework |
SA38 | ABAP Reporting Basis | Report Tree |
SPRO | Customizing | Edit Project Basis |
Posted by Unknown
SAP Security tables
AGR* SAP Security tables contain data about roles. | See tables below for details |
USR* table contains user master information. | |
USH* table has change documents information. | |
you may use SE16 or SQVI to display data from these tables. | |
Table | Description |
UST10C | Composite profiles (i.e. profile has sub profile) |
UST04 | User profiles (multiple rows per user) |
USR40 | Table for illegal passwords ( never enter * in this table) |
USR13 | Short text for authorisation |
USR12 | Authorization values |
USR11 | Text for authorisation profiles |
USR10 | Authorisation profiles (i.e. &_SAP_ALL) |
USR06 | License data |
USR04 | User master authorization (one row per user) |
USR02 | Logon data (password, user name, validity date etc…) |
USR01 | User Master Data (runtime data) |
USOBXFLAGS | Temporary table for storing USOBX/T* change |
USOBX_C | Check Table for Table USOBT_C |
USOBX | Check table for table USOBT |
USOBT_C | Relation Transaction to Auth. Object (Customer) |
USOBT | Relation transaction to authorization object (SAP) |
USH02 | Change history for logon data |
USGRPT | Text table for USGRP |
USGRP | User groups |
USER_ADDR | Address Data for users |
AGR_USERS | Assignment of roles to users |
AGR_TIME | Time Stamp for Role: Including profile |
AGR_TEXTS | File Structure for Hierarchical Menu – Cus |
AGR_TCDTXT | Assignment of roles to Tcodes |
AGR_PROF | Profile name for role |
AGR_OBJ | Assignment of Menu Nodes to Role |
AGR_HIERT | Role menu texts |
AGR_HIER2 | Menu structure information – Customer vers |
AGR_DEFINE | Role definition |
AGR_AGRS | Roles in Composite Roles |
AGR_1252 | Organizational elements for authorizations |
AGR_1251 | Authorization data for the activity group |
AGR_1250 | Authorization data for the activity group |
AGR_1016B | Name of the activity group profile |
AGR_1016 | Name of the activity group profile |
This is the vast list of USR,USH & AGR tables | |
Table name | Description |
USRVIEWTAB | User-specific Tabstrip View |
USRVIEWCOL | User-Specific Column View |
USRVART | Short Texts for Variants of Critical Authorizations |
USRVARID | Part List of Variants for Critical Authorizations |
USRVARCOMT | Short Texts for Variants of Critical Combs of Authorizations |
USRVARCOM | Variants of Critical Combinations of Authorizations |
USRVAR | Variants for Critical Authorizations |
USRURLSVR | Logical Web Servers for Logical Systems (User-Specific) |
USRURLPRS | Table for Personalization of Services |
USRTREECOL | User-Specific Column Permutations per Array Type |
USRTICLASS | Class Assignment for Tabular Maintenance of iPPE |
USRSYSVTYP | Generated Table for View USRSYSVTYP |
USRSYSUZUS | CUA: Texts for Special Versions |
USRSYSUTYP | CUA: Texts for User Types in SAP System |
USRSYSUTPA | CUA: System Measurement: User Types with Attributes |
USRSYSUPPL | CUA: Assignment of User Types to Price Lists |
USRSYSUPL | CUA: Price Lists in SAP System |
USRSYSPRFT | CUA: Profile Text in Distributed Systems |
USRSYSPRF | CUA: Profiles in Distributed Systems |
USRSYSLNG | User’s Language in a System |
USRSYSACTT | CUA: Roles in Distributed Systems |
USRSYSACT | CUA: Roles in Distributed Systems |
USRSTAMP | Time Stamp for all Changes to the User |
USRSETTINGS_DYNP | User Settings: Navigation Tree – Dialog Structure |
USRPWDHISTORY | Password History |
USRPDM | User-Specific Data in the PDM Environment |
USROBJECTS | Table of Previous Initial Object in Structure Overview |
USRMM | User settings: material master |
USRMETHOD | Method to be called when distributing users |
USRM3 | Material Master User Settings: Retail Organizational Levels |
USRM2 | User Settings for the Material Master: Logical Screens |
USRM1 | Material Master User Settings: Organizational Levels |
USRM0 | Material Master User Settings: Screen Reference “User” |
USRLUISETTINGS_DYNP | User-Specific Settings for Profile |
USRLUISETTINGS | User-Specific Settings of the iPPE Workbench Express |
USRLUIPROFILE_DYNP | User Assignments to Profiles |
USRLUIPROFILE | User Assignments to Profiles in the iPPE Workbench Express |
USRLISTPROFILE | Variable List Definition in PDM Environment |
USRINKONS | Reference table for FMs for determining inconsistencies |
USRINFO | Extended User Info for SM04 |
USRGISTACK | iPPE Workbench: Stack |
USRGISETTINGS | User Settings for the iPPE Workbench |
USRGIPROFIL_WTY | Assign User Profile |
USRGIPROFIL_DYNP | Dialog Structure: User Assignment – iPPE Workbench |
USRGIPROFIL | User Assignment to an iPPE Profile |
USRGIFOL | iPPE Interface: Folder |
USRGIFAV | iPPE Interface: Favorite |
USRGETSTRC | Structure for user transfer |
USRGETFTR | Transfer Structure |
USRGENPRS | Table for General Workplace Personalization Data |
USRFLDVAL | CUA: Selection Criteria for Field Attributes |
USRFLDTSEL | Selection of fields |
USRFLDT | CUA: Text Table to Define Logical Fields |
USRFLDSEL | CUA: Field Attributes |
USRFLDGRP | CUA: Field Selection Groups |
USRFLDDEF | CUA: Definition of Logical Field Names of ALE Distributed Users |
USRFLD | CUA: Definition of Logical Fields |
USRFIELD | Central user maintenance: Field maintenance allowed or not |
USREXTIDTT | Values Table for External ID Type (Texts) |
USREXTIDT | Values Table for External ID Type |
USREXTIDH | External ID (Access Using Hash Value) |
USREXTID | Assignment of External ID to Users |
USREL_UT | User Administration: User in Relationship (with Time) |
USREL_USA | User Administration: User – System – Activity Group |
USREL_US | GUM: Assignment of User (Group) to System (Type) |
USREL_UA | GUM: Assignment of Role to User |
USREL_SA | GUM: Assignment of Role/Position to System (Type) |
USREL_AT | User Administration: User in Relationship (with Time) |
USREL_3 | User Administration: Relationship Between Three Objects |
USREL_2 | User Administration: Relationship Between Two Objects |
USREL__U | User Administration: User in Relationship |
USREL__S | User Administration: System in Relationships |
USREL__A | User Administration: System – Activity Group |
USREFUSVAR | Assignment of Reference User Variable to Reference User |
USREFUS | Reference user for internet applications |
USREF | Transfer structure for cross-reference function modules |
USRDFLT_PERS_ALV | User Settings – ALV Display |
USRDFLT_PERS | User Settings |
USRDFLT_KEY | Key for User Settings |
USRDFLT | User Settings Field/Value Combination |
USRCRCOMB | Part List of Variants for Critical Combinations of Auths |
USRCOMBT | Short Texts for Critical Combinations of Authorizations |
USRCOMB | Critical Combinations of Authorizations |
USRCOBJ | Object Filters for Exploding Product Structures |
USRCDT | Structure for Change Documents (Technical View) |
USRCD | Structure for Change Documents Display in RSUSR100 |
USRBF3 | User Buffer Content for Fast RFC Logon – New |
USRBF2 | User buffer content for fast RFC logon – new |
USRBF | User Buffer Contents for Fast RFC Logon |
USRATTR | Additional Attributes for Users |
USRARCSTAT | Reloaded Archiving Runs |
USRACLEXT | Extended SNC Access Control List (ACL) for Users |
USRACL | SNC Access Control List (ACL): User |
USRACCNTV | Generated Table for View USRACCNTV |
USR41_MLD | Transaction Data for USR41 |
USR41 | User master: Additional data |
USR40 | Table for illegal passwords |
USR30 | Additional Information for User Menu |
USR22 | Logon data without kernel access |
USR21S | Shadow table: Assignment of user name to address key |
USR21 | Assign user name address key |
USR20 | Date of last user master reorganization |
USR16 | Values for Variables for User Authorizations |
USR15 | External User Name (Replaced By Table USRACL) |
USR14 | Surchargeable Language Versions per User |
USR13 | Short Texts for Authorizations |
USR12 | User Master Authorization Values |
USR11 | User Master Texts for Profiles (USR10) |
USR10 | User master authorization profiles |
USR09 | Entries for user menus (work areas) |
USR08 | Table for user menu entries |
USR07 | Object/values of last authorization check that failed |
USR06SYS | System-Specific User Classification (License-Related) |
USR06 | Additional Data per User |
USR05 | User Master Parameter ID |
USR04 | User master authorizations |
USR03 | User address data |
USR02 | Logon Data (Kernel-Side Use) |
USR01 | User master record (runtime data) |
USR_VALUES | Transfer structure for selection acc. to auth. values |
USR_TREESNODE | Node Structure of a Simple Tree (Report SAPTREX3) |
USR_QUERY | BW Query |
USR_LIST | Generated Table for View USR_LIST |
USR_FLGNT | Personal User Settings / Without Transport |
USR_FLAGS | Various Flags for Authorization Programs |
USR_AUFK | User-Defined Fields of AUFK |
USH12_ARC_TMP | Change History for Authorizations: Last Archive Entries |
USH12 | Change history for authorization values |
USH10_ARC_TMP | Change History for Profile Data: Last Entries from Archive |
USH10 | Change history for authorization profiles |
USH04_ARC_TMP | Authorizations Change History: Last Entries from Archive |
USH04 | Change history for authorizations |
USH02_ARC_TMP | Change History for Logon Data: Last Entries from Archive |
USH02 | Change history for logon data |
AGRR2T | R2 roles transfer structure – Texts |
AGRR2 | R2 transfer structure |
AGR_USERT | Assignment of roles to users |
AGR_USERS | Assignment of roles to users |
AGR_UPLTX | Structure for upload description text |
AGR_UPLT | Structure for upload node types |
AGR_UPLO | Structure for upload node types |
AGR_TXT | Role and Text |
AGR_TRANS | Help Structure for Translation |
AGR_TRAN | Transport modules of external personalization objects |
AGR_TIMED | Time Stamp for Role (Profile Comparison, RFC Distribution) |
AGR_TIMEC | Time Stamp for Role (User Assignment) |
AGR_TIMEB | Time Stamp for Role (Profile Generation) |
AGR_TIME | Time Stamp for Role (Menu, Profile, Authorizations) |
AGR_TEXTS | File Structure for Hierarchical Menu – Customer |
AGR_TCODES_TEXTS | Transaction Codes with Texts from AGRs |
AGR_TCODES | Assignment of roles to Tcodes |
AGR_TCODE3 | Assignment of roles to Tcodes |
AGR_TCDTXT | Assignment of roles to Tcodes |
AGR_TAB | PFCG start tree transfer structure |
AGR_STRUC | Structure to transfer Tcodes into the Profile Generator |
AGR_STRING | Structure for the Drag and Drop Tool |
AGR_START | Start Role Maintenance: Structure for Tree |
AGR_ST_NAME | Role Name |
AGR_SPRTXT | Structure for the Drag and Drop Tool |
AGR_SMENU | Transfer structure for role maintenance |
AGR_SHIERT | Structure for the Drag and Drop Tool |
AGR_SHIER_BOR | Structure for Additional Details with no STRING Field |
AGR_SHIER | Structure for the Drag and Drop Tool |
AGR_SELECT | Assignment of roles to Tcodes |
AGR_REL_KNUMA_CM | Assignment: Agreement –> Campaign |
AGR_PROF | Profile name for role |
AGR_POPUP3 | Auxiliary structure to input authorization objects |
AGR_POPUP2 | Structure for transaction assignment |
AGR_POPUP | Structure for dialog box |
AGR_OBJ | Assignment of Menu Nodes to Role |
AGR_NUMBER | Internal Counter for Assigning Profile Names |
AGR_NUM_2 | Internal Counter for Assigning Profile Names |
AGR_NSPCE | Namespace |
AGR_MINIT2 | Role mini-application texts |
AGR_MINIT | Role mini-appl texts |
AGR_MINI2 | MiniApps in Role |
AGR_MINI | MiniApps in Role |
AGR_MEM_INITIAL | Agreements: Buffer for Initial Upload |
AGR_MARK | Table for report SAPPROFC_NEW |
AGR_MAPP | MiniApps in Role |
AGR_MAP_KNUMA | Conversion Table AG_GUID CRM <> KNUMA |
AGR_MAP | MiniApp and Text |
AGR_LSD | Role attributes |
AGR_LOGSYS | Logical system |
AGR_INFO | Filter Values from Generation Run |
AGR_ICON | Display the status icon in the Profile Generator |
AGR_HPAGET | Description of the Home Page for a Role |
AGR_HPAGE | Role Home Page |
AGR_HIERT3 | Role menu texts – SAP Original |
AGR_HIERT2 | Role menu texts – Customer version of SAP objects |
AGR_HIERT | Role menu texts |
AGR_HIER3 | Menu structure information – SAP version of SAP roles |
AGR_HIER2 | Menu structure information – Customer version of SAP roles |
AGR_HIER_BOR | Table for Object-Oriented Navigation (OBN) |
AGR_HIER | Table for Structure Information for Menu |
AGR_FLAGSB | Role attributes |
AGR_FLAGS | Role attributes |
AGR_FILT | Transfer table filter for PRGN_TREE_START |
AGR_FAVOS | Personal settings for PFCG |
AGR_EXT_DTL | Extended Details for Menu Nodes |
AGR_DEFINE | Role definition |
AGR_DATEU | Personal settings for roles |
AGR_CUSTOM | Role Customizing objects |
AGR_CATS | Transfer structure for categories/PFCG start |
AGR_BUFFI3 | Internet links table – SAP versions of SAP roles |
AGR_BUFFI2 | Internet links table – Customer version of SAP roles |
AGR_BUFFI | Internet Links for a Role |
AGR_BOR_DTL | Extended BOR Details for Menu Nodes |
AGR_ATTS | Role attributes |
AGR_AGRS2 | Role definition |
AGR_AGRS | Roles in Composite Roles |
AGR_1253 | Authorization Data for Activity Group – Static Objects |
AGR_1252 | Organizational elements for authorizations |
AGR_1251 | Authorization data for the activity group |
AGR_1250 | Authorization data for the activity group |
AGR_1016B | Name of the activity group profile |
AGR_1016 | Name of the activity group profile |
Posted by Unknown