What are the different types of tabs that are present in the pfcg?
Answer / neelima
PFCG tabs differ as per roles.
Single role /Master/ Derived : Description , Menu , Application, Workflow, Authorization, User , Personalization
Composite Role: Description, roles , Menu and Personalization
Is This Answer Correct ? | 0 Yes | 0 No |
1).what is the diff b/w adding the tcode in s_tcode authorization object and addind the tcode inmenu tab of pfcg? 4) What is the difference between Owner, Controller and Administrator in Firefighter? 2) Can you tell me why do you use S_TABU_DIS authorization object? 3) Explain How do you restrict a particular table acces then? 5)In RAR ,What are the default Back ground Jobs? 6)Which job will update all user master records? 7)What will happen whenever we execute a t-code? 8)What is the purpose of the report RSUSR006? 9) Lets say a user is locked by admin? What value will you see in USR02 table and in UFLAG column? 10) What will you do if the user complains that he is not able to access a t-code? 11)why we have to delete users ? 12)a. What is Direct role assignment and indirect role assignment? b. What is the process of adding a t-code to an existing role? c. If client asked you to modify a role directly in PRODUCTION for emergency? Is it possible? What you will do in that situation? d. What is the purpose of customized Transaction codes? Have you created any custom t-codes? 13)
What is t code?
what is authorization object and authorization object class?
What is stad?
I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?
How do i display users with SAP_ALL roles.
how to assign a tcode to user without a role?
how to do Assigning authorization groups for table restrictions and program restrictions.
how do we test security systems.what is the use of SU56
Could any one tell me "What is critical authorizations in sap security"?
hOW many users limit in su10
3 Answers Accenture, Cap Gemini, Hexaware,
Can you explain transport system-level security?