How you actually reduce the scope of security checks?
Please note
Authorization objects excluded from deactivation
Basis
Human Resources
Previous slide
Next slide
Back to first slide
View graphic version