Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is use of derived roles and where it is used?

Answer Posted / naresh kasireddy

Derived roles are also called as Child Roles and Master
Roles are called as Parent Roles.

Derived Roles refers to the roles that already exist. As
name indicates Derived roles are derived from other role
(Master Role).

Derived ROles inherits the menu structure and functions
included (transactions, reports, Weblinks and so on) from
the role referenced.
The default authorization values of the derived role are
that of the inherited role. The Org Levels are to be
maintained in the derived Role

Is This Answer Correct ?    5 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is stad?

1220


Is it possible to change role template? How?

1306


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4526


What authorization is required to create and maintain user master records?

1155


How to update risk id in rule set?

1226


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2714


What is use of derived roles?

1303


Explain internet-level security?

1185


Pfcg proposed activities but you need only two. What would you do?

1188


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2396


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2429


How we Educated client personnel in R/3 Security and general Basis knowledge

2331


Which t-code can be used to delete old security audit logs?

1538


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3638


How to run the daily background job s for virsa violations ? thabks in advance

3712