Where you can enable Read Access Logging tools?
Which of the following authorization objects are used to secure the execution of External Commands when a defining a background job step?
Note: There are 2 correct answer to this question.
Which feature is available in the CommonCryptoLib Scenario provided by SAP Security Library?
Your company uses derived roles. During maintenance of the Plant Manager imparting role, you add a new transaction to the Menu tab which introduces a new organizational level that will be unique for each of your 150
plants. How will the new organization level be maintained in the derived roles?
Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?