Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q3)
What is difference between R/3 security and HR security?
Explain in detail or its importance?

Answer Posted / hyma v sangaru

In R/3 the Security is through General Auth. profile and in
HR Security it is a combination of Structural Auth Profile
and General Auth. Profile .
General Auth. Profile is restricted through Object and
field values . Structural Profile is data model based on
different object types and thier relationships which are
components of Personnel Management i.e 1. Organization
Management 2. Personnel Development AND 3. Time and Event
management.

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

You want to remove a developer's and developer keys from a system. How would you do that?

1098


Explain network topology in sap systems?

1091


Differentiate between temp role and copy role

1190


what is the difference between usobt_c and usobx_c?

1348


Which tables will you use for making customizing setting for security administration?

1155


what are the issues you faced with UME?

3063


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2287


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2808


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4455


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2338


Explain internet-level security?

1134


What is the maximum number of profiles in a role and maximum number of object in a role?

1023


how we do CUA configuration in Quality system

2433


what is authorization object and authorization object class?

1262


Is it possible to change role template? How?

1220