Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is use of derived roles and where it is used?

Answer Posted / karun

1.U can change the Org (Eg:Company code,Business area,
Plant ... etc) values in Derived roles only.

2.Derived role have authorization Tab, in composite role no
authorization tab.

Is This Answer Correct ?    4 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1007


What are pfud t-codes used for?

1163


When would you update a sap table directly? What precautions would you taje?

1158


what is authorization object and authorization object class?

1195


What does the profile generator do?

1069


what is centralize FFID?

2030


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1138


You want to remove a developer's and developer keys from a system. How would you do that?

1046


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4404


what is use of copy data in derived role and when we use this one ???

1730


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1337


What are st01 t-codes used for?

1110


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2611


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2286


What is the use of su56?

1086