1. what is the difference b/w change authorization mode and
expert mode.
2.when we do the user comparison in pfcg what is the
difference in complete comparison and expert mode comparison.
3. what are the critical auth objects in security point of you ,
4.when we do the transportation of composite role what will
happened .
5.while doing the kernel upgrade we download the executable
s one by one are all together.
6. while applying the patches what is the importance of test
import why we do test import
Answer Posted / giridhar
1)f new authorization created threw change authorization.If
you edit the old authorization and add the the new
authorization we can use export mode.
2)This is also same for first if you create new role in pfcg
you can use user comparison,is you change the old role and
giving the new changes we can use the expert mode comparison.
3)S_DEVELOP, S_PROGRAM, S_ADMI_FCD
4)If you insert in composite role in transport request
automatically child roles also included in transport request.
5)All together.
6)If you test import is success means the patch uploaded
successfully.
| Is This Answer Correct ? | 3 Yes | 1 No |
Post New Answer View All Answers
what is the use of defaults tab in start menu
What is the main purpose of parameters, groups & personalization tabs?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What is the difference between role and a profile?
Which transaction code is used to display the user buffer?
Explain internet-level security?
By which parameter number of entries are controlled in the user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
You want to remove a developer's and developer keys from a system. How would you do that?
what is the main difference between the derived role and a single role?
Can you explain document transfer-level security?