SU25 Step6 How Roles are created through Profiles?
Answers were Sorted based on User's Feedback
Answer / sri
step 6: copy data from old profiles
group of authorizations and authorization objects is called a profiles by this profile generator the roles are created.
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / shanu
If you do decide to use SU25 Step 6 to convert the Manual
profiles to activity groups, you will need to watch out for
the following “gotchas”:
Naming convention (T_500yyyyy_previous name)
All activity groups created before SU25 is run, are renamed
to T_500yyyyy_previous name.
See OSS note 156196 for additional information and
procedures to rename the activity groups back to their
original names using program ZPRGN_COPY_T_RY_ARGS.
Carefully review information regarding the loss of links
between profiles and user master records.
Is This Answer Correct ? | 0 Yes | 0 No |
Using which table transaction code text can be displayed?
You want to remove a developer's and developer keys from a system. How would you do that?
Can you explain internet-level security?
can any tell me if a t_code is assigned to 5000 users then how would you find out who never uses this t_code?
how to lock the client?
How we Creat Mass users via writing LSMW scripts.
what is the advantage of cua from a layman/manager point of view?
How to assign any program to user?
How we can see FFID log report, before any prerequisite?
In SU53 screenshot , there are missing authorization. How you come to know that these are the relevant Roles in which we have to add these objects? Decision not SUIM
how we Set up Central User Administration (CUA) to manage 4 systems/clients
How to insert missing authorization?