1. what is the difference b/w change authorization mode and
expert mode.
2.when we do the user comparison in pfcg what is the
difference in complete comparison and expert mode comparison.
3. what are the critical auth objects in security point of you ,
4.when we do the transportation of composite role what will
happened .
5.while doing the kernel upgrade we download the executable
s one by one are all together.
6. while applying the patches what is the importance of test
import why we do test import

Answer Posted / itsgaurav151

Ans.1 - Change auth mode opens the last saved authorizations
for change. If any new t-code is added to that role
then change auth only
adds the relevant objects in role for the new t-code.

Expert mode has three options detailed below:
1) Delete old auth and create new - This will delete all old
auth data except org values and will create new
authorization by including the objects maintained for t-
codes of role in SU24.

2) Edit Old Status- This will open last saved auth for
change with any change/addition of relevant
objects if you have added any new t-code to role.

3) Edit old status and merge with new - It will include the
new objects for newly added t-code in role and also
compares the objects for old t-codes of role and includes
in role the missing object/auth values if any, deleted
earlier due to any reason. New added auth objects will
have the status new.Updated auth objects will get the
status updated. Old objects not change will have the
status old.

Is This Answer Correct ?    21 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

In pfcg where we can add customized t-codes. And where we can see customized t-codes

1388


What is the maximum number of profiles in a role and maximum number of object in a role?

779


What authorization is required to create and maintain user master records?

822


How to codify for an Item in SAP? How many digits are required for an item?

2354


List the various user types.

802






Differentiate between derived role and composite role

800


As a SAP security consultant what is the most challenged you faced in previous company?

811


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1946


What is the procedure for role modifications?

829


Can you explain protecting public keys?

777


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2376


How to run the daily background job s for virsa violations ? thabks in advance

3373


could anyone tell me how we can copy the mass roles from sap_all profiles???????

1842


What is the use of Personalization tab in SU01?

5257


What does the profile generator do?

841