After maintaining authorization fields, we save and
generate the profile. But it prompts for the profile name
right when we click on 'Save' icon. So what is the basic
difference between Saving and Profile Generating?

Answer Posted / qrueshi

While saving profile means just we are saving in to dummy
space it has no effect

Due to generating profile we are activating the
authorization which is maintained

Only difference is if you just saved then it is not
activated status i.e Deactivated status

when you genarate it it will change the status into working
status or activated status

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to create users?

734


How to run the daily background job s for virsa violations ? thabks in advance

3165


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

659


what is the difference between usobt_c and usobx_c?

777


What are su56 t-codes used for?

691






What does the item category specify in a purchasing order in SAP Materials Management?

940


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

903


What are the upgrades happened in GRC 5.3 from GRC 5.2?

3731


Differentiate between usobx_c and usobt_c

630


How we Educated client personnel in R/3 Security and general Basis knowledge

1804


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

2747


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4149


What are the different types of sap security tables?

670


Can you explain transport system-level security?

603


Can wildcards be used in authorizations?

706