1. what is the difference b/w change authorization mode and
expert mode.
2.when we do the user comparison in pfcg what is the
difference in complete comparison and expert mode comparison.
3. what are the critical auth objects in security point of you ,
4.when we do the transportation of composite role what will
happened .
5.while doing the kernel upgrade we download the executable
s one by one are all together.
6. while applying the patches what is the importance of test
import why we do test import
Answer Posted / giridhar
1)f new authorization created threw change authorization.If
you edit the old authorization and add the the new
authorization we can use export mode.
2)This is also same for first if you create new role in pfcg
you can use user comparison,is you change the old role and
giving the new changes we can use the expert mode comparison.
3)S_DEVELOP, S_PROGRAM, S_ADMI_FCD
4)If you insert in composite role in transport request
automatically child roles also included in transport request.
5)All together.
6)If you test import is success means the patch uploaded
successfully.
Is This Answer Correct ? | 3 Yes | 1 No |
Post New Answer View All Answers
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
how a t code works
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Explain protecting public keys?
What are su25 t-codes used for?
Can you explain snc in sap security?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
When would you update a sap table directly? What precautions would you taje?
what is sod in sap security?
What are se10 t-codes used for?
what is use of copy data in derived role and when we use this one ???
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What is the difference between c (check) and u (unmaintained)?
What authorization is required to create and maintain user master records?