GRCwithRaghu
Explorer
Member since ‎2017 Aug 15

User Statistics

  • 24 Posts
  • 0 Solutions
  • 5 Kudos given
  • 102 Kudos received

User Activity

The journey to SAP S/4HANA can take different forms, depending on your organization's goals, existing system landscape, and appetite for change. Whether you're looking to redesign your processes entirely, preserve your current system, or take a more ...
Are you finding it challenging to use EWZ5 for locking and unlocking users during upgrade activities? Have you discovered that this transaction code is now obsolete and are you relying on a custom program? If so, consider using the ABAP program RSUSR...
In my previous article, I’ve detailed about the nuances of securing SAP systems and the debate surrounding Security by default and Security by design. Those who missed it, can have a look at the blog post using this link.https://community.sap.com/t5/...
FFID's were a commonly used by many users in a system. Users can request for FFID and upon approval by the owner. In many cases, FFIDs are mis-used and owners without validating the actual requirement may approve the request. To avoid this risk, SAP ...
It's a debate worth delving into at any time! Should organizations adhere to the default security configurations within an application, or should they design their own to enhance security?In today's digital world, keeping sensitive business informati...