Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the main differene between roe and profile?

Answer Posted / shweta daga

Role is a set of function/activity which is assigned to him
based on his business role. Assigning a role to the user
does not mean that the user has access to execute those
functions.. this is ruled by profiles. Profile are required
to give necessary authorization to the users through the
respective roles.

Is This Answer Correct ?    3 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain document transfer-level security?

1205


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

2265


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1733


What profile versions?

1240


What is the difference between authorization object and authorization object class?

1179


Explain network topology in sap systems?

1154


What is Sap security t-codes?

1265


how we do CUA configuration in Quality system

2485


What is the use of su56?

1199


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2547


What are the most used tables in sap?

1254


How to codify for an Item in SAP? How many digits are required for an item?

2707


What are su53 t-codes used for?

1435


What is sap cryptographic library?

1119


What is use of derived roles?

1302