Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

After maintaining authorization fields, we save and
generate the profile. But it prompts for the profile name
right when we click on 'Save' icon. So what is the basic
difference between Saving and Profile Generating?

Answer Posted / g. sudhakar

Group of upto 150 authorizations can fit into single
profile. To assign the authorizations to the users,
required to name to store one name called a PROFILE.
Without saving the authorizations will not stored into
profile. For this reason first we will save the
authorizations and then generate, automatically it will
generate name termed as a PROFILE. After then we can assign
this profile to the user. Atlast we will use USER
COMPARISION for taking effect into USER MASTER RECORDS.
............. G. SUDHAKAR

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2391


Which transaction should not be given to BASIS and DEV team in Production?

2453


How we Educated client personnel in R/3 Security and general Basis knowledge

2216


User is not there in User master record. Then how to trace the user?

1427


Which t-code can be used to delete old security audit logs?

1427


What is sap cryptographic library?

1019


By which parameter number of entries are controlled in the user buffer?

1343


How we schedule and administering background jobs?

1063


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2285


what is the use of defaults tab in start menu

1831


how to do Reporting and Analysis authorizations

2390


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2091


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2430


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2176


What are se09 t-codes used for?

1196