Answer Posted / deepak
Hi Raghu, more precisely profile is set of different authorizations for different objects. It means when you create role and go for generating profile whatever the list of transactions you have added in role menu its corresponding objects automatically fetch up by profile generator. For which transaction which objects get fetch up this you can check using SU24 tcode only objects with check/maintain status get fetch up by profile generator during profile generation.And for better understanding you just keep in mind for every tcode there are certain set of objects. And Each objects has different fields and its value is called its value i.e 01,02,03 create,change,display respectively. I hope now its clear to you
| Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What is a composite role?
how you can delete multiple roles from qa, dev and production system?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
explain the personalization tab within a role?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
what is the process to find that one consultant had removed a table from sap tables
what is the different b/w su10 and su12
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Which transaction code is used to display the user buffer?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Differentiate between derived role and composite role