Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What's the use of Detour path? How Fork path differs from
Detour path

Answer Posted / sudha

If a WF fulfills a certain condition e.g.SOD violation the
original WF ends and takes a predefined alternative route
(detour). This workflow can contain other stages and
additional approvers.

Fork is a way to split up a workflow from a single
initiator between sap and non-sap systems

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4677


You want to create and maintain user master record. What authorization would you need?

1153


What is the difference between usobx_c and usobt_c?

1040


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2423


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1050


what is the process to find that one consultant had removed a table from sap tables

2509


Explain network topology in sap systems?

1062


Any details about secatt apart from SAPSecurity online.com?

2283


What are the different types of sap security tables?

1078


What does the item category specify in a purchasing order in SAP Materials Management?

1356


Can wildcards be used in authorizations?

1182


What are se10 t-codes used for?

1103


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7112


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2616


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2693