Answer Posted / krishna.b
in pfcg use user compare and complete compare.if you are
using role to generate authorization profiles that should
not assigned in the user master records untill activate the
user compare and complete compare.in composite role have no
user compare and complete compare.
Is This Answer Correct ? | 15 Yes | 0 No |
Post New Answer View All Answers
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How we schedule and administering background jobs?
Differentiate between temp role and copy role
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
what is sod in sap security?
Explain network topology in sap systems?
How to assign any program to user?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
what is the main difference between the derived role and a single role?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Explain transport system-level security?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?