Whay can't you assign a composite role to another composite
role ? Need clear explaintion.
Answer Posted / gaurav.s
Guys you were wrong..a single role without a profile can
also be assigned to a composite role.Basavaraj, i was
looking for a technical reason for this behaviour. Well i
have explore it myself and the correct answer is :
What prevents you from adding a composite into a composite
is that within PFCG is a validation provided through
Function Module PGRN_CHECK_COLLECTIVE_AGR. That FM checks a
few things, one of which being that for the inserted role,
it is not a collective (composite) role defined
via table AGR_FLAGS field COLL_AGR=X.
Join SAP Security Group on Facebook :
https://www.facebook.com/groups/sapsecindia/
Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What does the item category specify in a purchasing requisition in SAP Materials Management?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What are some ap security t codes?
Explain internet-level security?
How to assign any program to user?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Pfcg proposed activities but you need only two. What would you do?
Which t-code can be used to delete old security audit logs?
What is the difference between role and a profile?
How can sap security be improved?
Can you explain document transfer-level security?