does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile
Answers were Sorted based on User's Feedback
We never add and we don't have option to add any Auth.Objects /Org. values to the composite role . If you wanna to add the Auth.Objects/Org. Values we can do changes only to the Single roles/Child Roles under that composite role and will update in teh composite role. In this Compoiste Role we can see only Menu's Tab where we can remove the duplicate entries.
170 Auth. can be assigned can be assigned to a profile.
Is This Answer Correct ? | 2 Yes | 1 No |
Answer / avinash
Max. number of auth. objects assigned to a profile is 178 as of ECC 6.0EHP6 version
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / gurunatha rao t
Composite Roles doesn't hold authorizations.Its like just container holding bunch of single roles.You have to modify the template/master role and inherit the changes to single roles and once done.Have to re-import the Composite Role which holds the respective single roles to get update the latest authorization
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / surya
composite roles have no authorization , it show only roles
no add org level in composte roles and 100 auth objects only add for profile
Is This Answer Correct ? | 0 Yes | 1 No |
Explain snc in sap security?
what are the profiles that are related to transports ? what are the A.O related to transports ?
What are se10 t-codes used for?
How to find out who has deleted users in the system?
where do you find the manually added tcodes in role tables.
In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)
which table is used to store illegal passwords?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
How to trace the Users in BI Security and give me navigation
1.What is the difference between Su24,su22,and su21? 2.What are the advantages of GRC in segregation of duties when we compare with virsa? 3.There is one derived role, if i copy the role of derived role will the parent or master role will be the same for the new which is derived from the derived role, if so why if not why? 4. what are the organizational level?
What are st01 t-codes used for?