After maintaining authorization fields, we save and
generate the profile. But it prompts for the profile name
right when we click on 'Save' icon. So what is the basic
difference between Saving and Profile Generating?

Answer Posted / shanti.s

If we do any modifications or If we create any role and
maintain authorization fields and values we will save those
changes. That means wht changes we have made that will be
saved. If we generate profile means it wil generate
profiles according to tcode and authorizaion objects you
have maintained in that role.That profiles wil remain in
user master records...

Thanks
Shanti.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2278


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2013


Explain snc in sap security?

707


What are se10 t-codes used for?

704


What authorization is required to create and maintain user master records?

681






Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3054


Can you explain sap system transactions?

693


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1858


How to find ECC system, GRC system and BI system ?

791


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

709


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

659


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2136


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

635


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1793


Can you explain internet-level security?

654