what is the procedure for deleting a role?
Answers were Sorted based on User's Feedback
you can't delete the role in Production System .
first you have to delete the role from development system.
in DEV system
GOTO - PFCG - > give the role name which one you want to
delete , create an transport request , dont release. After
creating transport request . delete the role from PFCG in
DEV system . transport the request number to Testing ,
Production system . ROles delete from there also , after
tranport the request with success .
Is This Answer Correct ? | 17 Yes | 0 No |
Answer / ranjith
1) create transport request to the role but dont release
2) delete the role from the system
3) Release the transport request.
Is This Answer Correct ? | 11 Yes | 0 No |
Answer / madhu babu sai
Log into R/3 system.
Execute PFCG tcode
enter the rolename you want to delete
In the menu.. click on Role tab where you can see an option
Distribute Deletion.
Click on that it will ask for the RFC destination. Give the
destination RFC name.
when the role is deleted from DEV it gets deleted from the
destination name given.
Is This Answer Correct ? | 2 Yes | 1 No |
As a regular security practice no user will be granted access to delete role permanently from production in-order to do that. The role has to be part of a transport before w e go ahead and delete it from DEV system and eventually transport it to Prod.
Steps: go to Dev system -> PFCG
you can use Mass transport or transport to move the role to prod. and delete the role
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.n.k
in the DEV system, create a transport request and add the
role to be deleted.
Then take a copy of the role (just for reference) and then
go to PFCG and delete the role.
Now transport the role in all other systems.
Is This Answer Correct ? | 3 Yes | 6 No |
Answer / dnyaneshwar kadam
execute tcode PFCG and type role name and delete. you can
delete role from all system.
Is This Answer Correct ? | 1 Yes | 23 No |
Can you explain protecting public keys?
what is transaction variant?
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
how a t code works
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How many transactions codes can be assigned to a role?
What are some ap security t codes?
what are the common idoc issues in a cua environment.how do you solve?
your functional team has asked you to provide the seurity for a tcode.how do you go about it?
What are major changes happened in GRC 10 compared to that GRC 5.3?
Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?
How can we maintain Organizational values? How can we create Organizational values? What is the purpose of these Org. values?