SU25 Step6 How Roles are created through Profiles?
Answer Posted / shanu
If you do decide to use SU25 Step 6 to convert the Manual
profiles to activity groups, you will need to watch out for
the following “gotchas”:
Naming convention (T_500yyyyy_previous name)
All activity groups created before SU25 is run, are renamed
to T_500yyyyy_previous name.
See OSS note 156196 for additional information and
procedures to rename the activity groups back to their
original names using program ZPRGN_COPY_T_RY_ARGS.
Carefully review information regarding the loss of links
between profiles and user master records.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is sod in sap security?
What is sap’s grc?
what are all the questions covered in "profiles related concepts " please let me know ?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Can you explain network topology in sap systems?
Which transaction should not be given to BASIS and DEV team in Production?
what is your ticketing tool? can we give some details about how we are getting tickets
What are pfud t-codes used for?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
what is user buffer?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
How do we test security systems.
explain the personalization tab within a role?