Hello Gurus,
I would really appreciate if anyone could help me with my below question, i am new to this forum, so sorry if my wordings are disintegrated
Why do we need to avoid trashing deactivated authorizations in SAP?
I am an SAP application security guy and it happened i encountered this question on one of the online posted documents
Thanks,
Venkat