<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://sapsecurityanalyst.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://sapsecurityanalyst.com/general-disclaimer/sap-web-as-abap/</loc><lastmod>2015-05-03T09:47:49+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/sap-r3-basics/</loc><lastmod>2015-05-03T09:35:11+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/</loc><lastmod>2015-05-03T02:26:53+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/security-tcodes/</loc><lastmod>2015-05-03T09:04:11+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/remote-function-calls/</loc><lastmod>2015-05-03T08:15:56+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/security-tables/</loc><lastmod>2015-05-03T09:03:10+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/hr-security-tcodes/</loc><lastmod>2015-05-03T05:27:08+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/hr-security-authorization-objects/</loc><lastmod>2015-05-03T05:29:49+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/infotypes/</loc><lastmod>2015-05-03T05:31:50+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/sap-hr-security/</loc><lastmod>2015-05-03T05:09:46+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/r3-security-introduction/</loc><lastmod>2015-05-03T09:01:08+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/user-authentication/</loc><lastmod>2015-05-03T09:06:12+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/authorization/</loc><lastmod>2015-05-03T09:06:54+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/elements-in-sap-authorization/</loc><lastmod>2015-05-03T09:09:06+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/sap-rfc-authorization/</loc><lastmod>2017-03-25T03:42:33+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/interview-questions/</loc><lastmod>2015-05-03T03:59:55+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sap-apo-security/</loc><lastmod>2015-05-02T13:11:53+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/interview-q-contdi/</loc><lastmod>2013-09-22T03:42:04+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/web-as-cont/</loc><lastmod>2015-05-03T09:49:58+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/roles/</loc><lastmod>2021-06-28T05:15:42+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/organizational-levels/</loc><lastmod>2015-05-03T09:19:07+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/su24-concept-in-sap/</loc><lastmod>2021-06-28T05:15:42+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/authorization-checks/</loc><lastmod>2015-05-03T09:17:29+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/rfc-maintenance-sm59/</loc><lastmod>2015-05-03T08:52:27+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/rfc-maintenance-contd/</loc><lastmod>2015-05-03T08:54:56+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/sap-password-expired/</loc><lastmod>2014-01-11T12:15:22+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/secatt/</loc><lastmod>2015-05-03T08:10:43+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/mass-user-creation/</loc><lastmod>2015-05-03T08:12:42+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/master-derived-roles-concept-in-sap/</loc><lastmod>2021-06-28T05:14:53+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/mass-user-to-role-assignment-using-secatt/</loc><lastmod>2016-03-24T14:37:37+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/interview-questions-part-3/</loc><lastmod>2013-09-22T03:53:08+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/interview-questions-part-4/</loc><lastmod>2012-09-20T20:52:10+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/interview-questions-part-5/</loc><lastmod>2013-11-09T03:13:04+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/su24-custom-tables-usobt_c-and-usobx_c/</loc><lastmod>2015-05-03T09:24:41+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/regenerate-sap_all-profile/</loc><lastmod>2013-12-03T13:03:32+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/hr-general-authorization-concept/</loc><lastmod>2015-05-03T06:08:10+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/google-results/</loc><lastmod>2012-03-07T16:05:11+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/how-to-transport-roles-in-sap/</loc><lastmod>2014-07-26T19:03:43+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/hr-authorization-fields/</loc><lastmod>2015-05-03T07:21:00+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/img-authorization/</loc><lastmod>2013-11-09T03:13:25+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/su25-steps/</loc><lastmod>2015-05-03T09:29:10+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sap-security-audit-guidelines-part-i/</loc><lastmod>2015-12-09T19:20:58+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sap-security-audit-guidelines-part-ii/</loc><lastmod>2017-02-19T09:33:32+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/interview-questions-part-6/</loc><lastmod>2012-10-20T09:38:14+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sap-table-authorization/</loc><lastmod>2014-04-21T04:03:39+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/s_tabu_nam/</loc><lastmod>2014-06-29T11:41:11+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/program-authorization/</loc><lastmod>2014-07-26T19:02:43+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sap-security-quiz/</loc><lastmod>2021-06-28T22:56:18+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/hr-master-data-authorizations/</loc><lastmod>2015-05-03T07:23:23+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/indirect-assignment-of-roles/</loc><lastmod>2015-05-03T07:29:36+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/relationship-between-various-organizational-units/</loc><lastmod>2014-05-31T14:41:04+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/personnel-number-check-p_pernr/</loc><lastmod>2015-05-03T07:24:52+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/applicant-infotype-authorization-p_appl/</loc><lastmod>2015-05-03T07:26:36+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/double-verification-principle/</loc><lastmod>2015-05-03T07:57:00+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/personnel-planning-plog/</loc><lastmod>2015-05-03T07:28:29+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/structural-authorization/</loc><lastmod>2015-05-03T07:59:15+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/elements-company/</loc><lastmod>2015-05-03T08:03:25+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/vlookup/</loc><lastmod>2014-03-09T09:30:42+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/context-solution/</loc><lastmod>2015-05-03T08:06:28+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/pfl_check_directory/</loc><lastmod>2014-03-27T02:54:16+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/stms-extra-requests-add-option-greyed/</loc><lastmod>2014-06-08T03:38:23+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/evaluation-path/</loc><lastmod>2015-05-03T08:08:07+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sap-security-quiz-ii/</loc><lastmod>2021-06-28T23:04:57+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/general-disclaimer/background-job/</loc><lastmod>2015-05-03T09:52:00+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/job-class/</loc><lastmod>2015-05-03T09:53:35+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/sm36/</loc><lastmod>2015-05-03T09:56:42+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/operation-mode/</loc><lastmod>2015-05-03T09:58:58+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/search_gcse/</loc><lastmod>2015-05-30T10:11:35+00:00</lastmod></url><url><loc>https://sapsecurityanalyst.com/skt-videography/</loc><lastmod>2021-06-16T00:17:32+00:00</lastmod></url></urlset>
