In 4.7 EE, we have an option as User -> Settings ->
Automatic Comparison at Save.
Is it right if i say that this option checked will
automatically prompt for User cpompare when we simply save
the data after entering the users to the role?
But whether the option is checked or not i did not get any
prompt for User compare on saving the data after entering
Users info in the role.
My another doubt is whats the difference between User and
Complete Compare options. If i dont do complete Compare,
wiill that effect? Is it right if i say that User compare
assigns the users to the role and Complete Compare updates
the user master recoirds , i.e., User master record
comparison is current.
Answer Posted / ravi
If you schedule the below mention sap default job in
background periodic every day or hourly basis no need to
compare manually.
PFG_TIME_DEPENDENCY (This Is a ABAP program)
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Any details about secatt apart from SAPSecurity online.com?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Can you explain document transfer-level security?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Differentiate between derived role and composite role
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
what is use of copy data in derived role and when we use this one ???
What is sap internet transaction server?
What is the procedure for role modifications?
what is sod in sap security?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Explain network topology in sap systems?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are the different types of sap security tables?