what do you mean by profile and obeject

Answer Posted / krishna

well,profile is a authorization profile and wheras object
can be an authorization class or authorization object or
field and value..

so, to make up a profile it requires several objects.....

Is This Answer Correct ?    5 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the different types of sap security tables?

669


When would you update a sap table directly? What precautions would you taje?

733


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

1800


Why is it important to delete sap-new profile? What steps will you take to do this?

678


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

1624






What is the difference between authorization object and authorization object class?

650


what is the difference between usobt_c and usobx_c?

777


Differentiate between temp role and copy role

705


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1798


What is sap internet transaction server?

706


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

6372


How to run the daily background job s for virsa violations ? thabks in advance

3164


What is the maximum number of profiles in a role and maximum number of object in a role?

628


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1879


What are pfud t-codes used for?

699