Q)if u r using 10 firefighter ids at a time? How will the
log reports goes to controller?
Q)wt is ruleset? and how to update risk id in rule set?
Q)wt is the procedure for Role modifications?explain with
example?
Q)who will done user comparision?
Answer Posted / sridhar gajulapalli
User comparision:
This is done when ever role is already assigned to users and changes are done in that role. In order to get the changes adjusted in the roles, user comparision is done.
Also during indirect asssignment of roles to user using t codes Po13 and po10, we have to to do user comparision, so that the roles get reflected in the SU01 record of user.
Generally this task is done PFCG_TIME_DEPENDENCY background job which runs once daily so that roles are adjusted after running this report.
If changes are to be reflected immediately, user comparision is recommended.
Is This Answer Correct ? | 3 Yes | 1 No |
Post New Answer View All Answers
What is the difference between role and a profile?
How can sap security be improved?
What are the uses of an authorization group?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Pfcg proposed activities but you need only two. What would you do?
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
What does the account assessment category specify in a purchasing order in SAP Materials Management?
Explain protecting public keys?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
User is not there in User master record. Then how to trace the user?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are su25 t-codes used for?
What does the item category specify in a purchasing order in SAP Materials Management?
What is the use of su56?
How to assign any program to user?