Answer Posted / satya prasad
First execute the tcode versa/Zvrat, in that we are
enterning user name in user field and the roles which ever
we want to add to the user and click on the simulation mode.
It checks whether there is any conflicts or not.
If we got any conflicts then we have to mitigate. After
mitigating we can assign all roles to the user.
After that we need to execute the simlation mode. same as
above.
Is This Answer Correct ? | 3 Yes | 3 No |
Post New Answer View All Answers
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Can you explain document transfer-level security?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
how you can delete multiple roles from qa, dev and production system?
What are se10 t-codes used for?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Differentiate between derived role and composite role
what is user buffer?
Can you explain transport system-level security?
What does the profile generator do?
What is the difference between authorization object and authorization object class?
What is use of derived roles?