Answer Posted / krishna
well,profile is a authorization profile and wheras object
can be an authorization class or authorization object or
field and value..
so, to make up a profile it requires several objects.....
| Is This Answer Correct ? | 5 Yes | 1 No |
Post New Answer View All Answers
How to assign any program to user?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
How can I do a mass delete of the roles without deleting the new roles?
You want to create and maintain user master record. What authorization would you need?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
what is use of copy data in derived role and when we use this one ???
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Pfcg proposed activities but you need only two. What would you do?
What is use of derived roles?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
By which parameter number of entries are controlled in the user buffer?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is sap internet transaction server?
what is the critical issue u are faced in your previous experience