1)What does the Profile Generator do?
2)What is the main purpose of Parameters, Groups &
Personalization tabs
3)in SU01? purpose of Miniapps in PFCG?
4)What happens to change documents when they are transported
to the
production system?
5)what are the issues you faced with UME?
6)what is the Ticketing tool that you are using in your
organisation?and
explain?
7)what do you know abt LSMW?
8)Difference b/w su22 and su24 ?
9)what is the landscape of GRC?
10)What is the difference between Template role & Derive
role?

Answer Posted / heena jain

1)What does the Profile Generator do?
Ans.The Profile Generator simplifies the creation of authorizations by automating various processes like provides the required authorizations for the selected functions.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How we Educated client personnel in R/3 Security and general Basis knowledge

1806


As a SAP security consultant what is the most challenged you faced in previous company?

674


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2014


Explain x-glueb and its use in sap security.

812


How to run the daily background job s for virsa violations ? thabks in advance

3168






How to find out who has deleted users in the system?

704


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

904


Can you explain protecting public keys?

603


When would you update a sap table directly?

656


What is the difference between the table buffer and the user buffer?

741


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2239


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1687


What are su53 t-codes used for?

837


What are pfud t-codes used for?

699


what is the use of defaults tab in start menu

1392