what is the difference between customizing request and workbenchrequest?
Answers were Sorted based on User's Feedback
Workbench Requests are those that involve changes to cross-client Customizing and Repository Objects. The objects are independent of the client.
Hence the requests are used for transferring and transporting changed Repository objects and changed system settings from cross-client tables.
Customizing Requests involve changes recorded to client-specific Customizing objects.
These client specific requests are used for copying and transporting changed system settings from client-specific tables. The Workbench request is used in Cross-Client Customizing,
this is when we change the settings, and this change applies for all clients. In customizing request the changes only apply to client.
If we transport a workbench request, the changes apply for all clients in the target system. If we transport customizing request, the changes only apply for the target client in import.
Workbench requests hold the changes made in repository changes while Customizing requests hold the changes made in customizing table entries.
Workbench request carries whatever development we are doing like creation of info objects and DSOs etc.
On the contrary Customizing request carries all the customizations we are doing in the system for example adding a new currency to the currency table, defining factory calendar etc.
Is This Answer Correct ? | 15 Yes | 0 No |
Answer / anusha
simply,
customizing request are to transfer customized data.
workbench request are to transfer standard data.
Is This Answer Correct ? | 5 Yes | 2 No |
Answer / chaitu
customized request is a if we change any existing role is a customizing request.
workbench request is a if we change any happens any authoisation data is a work bench request.
Is This Answer Correct ? | 0 Yes | 1 No |
Explain how you can lock all the users at a time in SAP?
what is use of su56?
Difference between short and Long Description in PFCG?
hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time
Support types of WOs you have faced?
How can we Lock transaction ? What happens exactly ?
How to do Role Design, Testing and Implementation
Can you explain internet-level security?
User done tasks with ffid n logged off but controller not get any log reports,why?
Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
If user says he don’t have authorization then how to proceed?
Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?