After maintaining authorization fields, we save and
generate the profile. But it prompts for the profile name
right when we click on 'Save' icon. So what is the basic
difference between Saving and Profile Generating?
Answer Posted / ukh
=> difference between Saving and Profile Generating?
Saving a profile is very similar to saving a regular program
and generating a profile is very similar to compiling a
regular program, hoping that you wrote a program sometime in
your life.
Say you are working on a profile and you have not finished
it completely and now you have to go away for 1/2 day (for
any reason), what will you do? Before you log off, if you do
not save your work, you will lose all the work you did so
far working on the profile. So, basically you will save it.
This does not mean it is ready to use. That also means it is
not active.
Now you come back to work, go into the earlier profile, and
now finish it completely and now you are ready to assign it
to the users. Here, you will have to "generate" the profile
and now the profile is ready for user assignment.
Is This Answer Correct ? | 9 Yes | 1 No |
Post New Answer View All Answers
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
As a SAP security consultant what is the most challenged you faced in previous company?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
How to find ECC system, GRC system and BI system ?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
what is the critical issue u are faced in your previous experience
Explain sap system transactions?
What are su53 t-codes used for?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
How to update risk id in rule set?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can you explain internet-level security?
how a t code works
What are su22 t-codes used for?
Why is it important to delete sap-new profile? What steps will you take to do this?