After maintaining authorization fields, we save and
generate the profile. But it prompts for the profile name
right when we click on 'Save' icon. So what is the basic
difference between Saving and Profile Generating?
Answer Posted / shanti.s
If we do any modifications or If we create any role and
maintain authorization fields and values we will save those
changes. That means wht changes we have made that will be
saved. If we generate profile means it wil generate
profiles according to tcode and authorizaion objects you
have maintained in that role.That profiles wil remain in
user master records...
Thanks
Shanti.
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Explain snc in sap security?
What are se10 t-codes used for?
What authorization is required to create and maintain user master records?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can you explain sap system transactions?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to find ECC system, GRC system and BI system ?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Can you explain internet-level security?