difference between BRF flat rule in BRF flat rule lineitem by lineitem.
Answer Posted / rajesh srisailapu
Key differences between BRF+ rule and BRF+ flat rule are again summarized below:
BRF+ rule
1.) Executed only once
2.) Complete request details passed to BRF rule by MSMP in form of a table
3.) Output of BRF+ rule is complete table with all lineitems
4.) Complex as compared to flat rule as loop is required
5.) Almost all business cases can be achieved by BRF+ rule
BRF+ Flat Rule
1.) Executed multiple times, Once for each lineitem
2.) Details of one lineitem at a time passed to BRF rule by MSMP
3.)Output of flat rule is result of one line item only
4.) Easy to create as no loop is required
5.) Some of business cases not possible in flat rule
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
How to assign any program to user?
Which t-code can be used to delete old security audit logs?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
When would you update a sap table directly? What precautions would you taje?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Any details about secatt apart from SAPSecurity online.com?
Support types of WOs you have faced?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
how we can see FFID if firefighter not able to see FFids ?
Explain network topology in sap systems?
Can you explain sap system transactions?
Differentiate between temp role and copy role
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Explain internet-level security?