Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

If I just want to give any user authorization to create role
but not to copy from any role so how can I do this ?

Answer Posted / kareem

Restrict the activity COPY in the role for pfcg for a user

Is This Answer Correct ?    7 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to codify for an Item in SAP? How many digits are required for an item?

2622


What is audit information system?

1102


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1469


Any details about secatt apart from SAPSecurity online.com?

2277


Explain x-glueb and its use in sap security.

1321


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2119


What does the profile generator do?

1082


what is the difference between usobt_c and usobx_c?

1316


What are st01 t-codes used for?

1120


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3521


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7104


Which transaction code is used to display the user buffer?

1156


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4168


What is sap cryptographic library?

1041


Can wildcards be used in authorizations?

1174