Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

how u add a roleowner in a role

Answer Posted / prakash

Normally, we do not have fields specifically for role owner.

Role owner names will maintain in long descriptions

Is This Answer Correct ?    0 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the different types of sap security tables?

1118


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1196


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1082


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2171


What is the main purpose of parameters, groups & personalization tabs?

1128


how to do Reporting and Analysis authorizations

2484


what is sod in sap security?

1241


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

1212


How to run the daily background job s for virsa violations ? thabks in advance

3664


What are the uses of an authorization group?

1206


By which parameter number of entries are controlled in the user buffer?

1412


Explain transport system-level security?

1176


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1978


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2348


what is the main difference between the derived role and a single role?

1158