1. what is the difference b/w change authorization mode and
expert mode.
2.when we do the user comparison in pfcg what is the
difference in complete comparison and expert mode comparison.
3. what are the critical auth objects in security point of you ,
4.when we do the transportation of composite role what will
happened .
5.while doing the kernel upgrade we download the executable
s one by one are all together.
6. while applying the patches what is the importance of test
import why we do test import

Answer Posted / giridhar

1)f new authorization created threw change authorization.If
you edit the old authorization and add the the new
authorization we can use export mode.
2)This is also same for first if you create new role in pfcg
you can use user comparison,is you change the old role and
giving the new changes we can use the expert mode comparison.
3)S_DEVELOP, S_PROGRAM, S_ADMI_FCD
4)If you insert in composite role in transport request
automatically child roles also included in transport request.
5)All together.
6)If you test import is success means the patch uploaded
successfully.

Is This Answer Correct ?    3 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2375


how a t code works

2062


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4292


Explain protecting public keys?

778


What are su25 t-codes used for?

795






Can you explain snc in sap security?

737


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1862


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2310


When would you update a sap table directly? What precautions would you taje?

851


what is sod in sap security?

827


What are se10 t-codes used for?

794


what is use of copy data in derived role and when we use this one ???

1422


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2094


What is the difference between c (check) and u (unmaintained)?

1305


What authorization is required to create and maintain user master records?

761