what is use of derived roles and where it is used?
Answer Posted / naresh kasireddy
Derived roles are also called as Child Roles and Master
Roles are called as Parent Roles.
Derived Roles refers to the roles that already exist. As
name indicates Derived roles are derived from other role
(Master Role).
Derived ROles inherits the menu structure and functions
included (transactions, reports, Weblinks and so on) from
the role referenced.
The default authorization values of the derived role are
that of the inherited role. The Org Levels are to be
maintained in the derived Role
| Is This Answer Correct ? | 5 Yes | 2 No |
Post New Answer View All Answers
How to do Role Design, Testing and Implementation
What is audit information system?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How do you check background jobs?
User is not there in User master record. Then how to trace the user?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
what is use of copy data in derived role and when we use this one ???
How to create users?
How to run the daily background job s for virsa violations ? thabks in advance
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what is the difference between usobt_c and usobx_c?
what is authorization object and authorization object class?