Answer Posted / krishna
well,profile is a authorization profile and wheras object
can be an authorization class or authorization object or
field and value..
so, to make up a profile it requires several objects.....
| Is This Answer Correct ? | 5 Yes | 1 No |
Post New Answer View All Answers
Explain document transfer-level security?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Pfcg proposed activities but you need only two. What would you do?
What are se09 t-codes used for?
Which t-code can be used to delete old security audit logs?
what are all the questions covered in "profiles related concepts " please let me know ?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
User is not there in User master record. Then how to trace the user?
What are pfud t-codes used for?
What is the use of tmssup* rfc destinations?
What are the most used tables in sap?
What are the uses of an authorization group?
What are some ap security t codes?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
What does the item category specify in a purchasing order in SAP Materials Management?