Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile

Answer Posted / shankarreddy08

We never add and we don't have option to add any Auth.Objects /Org. values to the composite role . If you wanna to add the Auth.Objects/Org. Values we can do changes only to the Single roles/Child Roles under that composite role and will update in teh composite role. In this Compoiste Role we can see only Menu's Tab where we can remove the duplicate entries.

170 Auth. can be assigned can be assigned to a profile.

Is This Answer Correct ?    2 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the different types of sap security tables?

1153


What is sap’s grc?

1230


How to run the daily background job s for virsa violations ? thabks in advance

3712


What are se10 t-codes used for?

1181


What does the profile generator do?

1176


Which tables will you use for making customizing setting for security administration?

1230


What are su53 t-codes used for?

1435


How can I do a mass delete of the roles without deleting the new roles?

1524


User is not there in User master record. Then how to trace the user?

1512


What are su25 t-codes used for?

1289


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1521


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2408


what is the critical issue u are faced in your previous experience

1981


Can you explain sap system transactions?

1186


Which t-code can be used to delete old security audit logs?

1537