SU25 Step6 How Roles are created through Profiles?
Answer Posted / sri
step 6: copy data from old profiles
group of authorizations and authorization objects is called a profiles by this profile generator the roles are created.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
what is the process to find that one consultant had removed a table from sap tables
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
how we do CUA configuration in Quality system
What are se10 t-codes used for?
You want to create and maintain user master record. What authorization would you need?
Why is it important to delete sap-new profile? What steps will you take to do this?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is the use of tmssup* rfc destinations?
Any details about secatt apart from SAPSecurity online.com?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What are some ap security t codes?