Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the difference between PFCG,PFCG_TIME_DEPENDENCY&PFUD???

Answer Posted / uday kiran

PFCG is used to create maintain and modify the roles.
PFCG_TIME_DEPENDENCY is a background job of PFUD.
PFUD is used for mass user comparison but the difference is

Is This Answer Correct ?    4 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

You want to remove a developer's and developer keys from a system. How would you do that?

1107


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4470


What are su53 t-codes used for?

1381


List the various user types.

1072


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1065


What is audit information system?

1145


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1147


What appears as the last sentence in sap note 587410?

1065


Differentiate between derived role and composite role

1181


What are se10 t-codes used for?

1150


Explain transport system-level security?

1176


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1328


When would you update a sap table directly?

1092


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2361


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2264