Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is use of derived roles and where it is used?

Answer Posted / naresh kasireddy

Derived roles are also called as Child Roles and Master
Roles are called as Parent Roles.

Derived Roles refers to the roles that already exist. As
name indicates Derived roles are derived from other role
(Master Role).

Derived ROles inherits the menu structure and functions
included (transactions, reports, Weblinks and so on) from
the role referenced.
The default authorization values of the derived role are
that of the inherited role. The Org Levels are to be
maintained in the derived Role

Is This Answer Correct ?    5 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2761


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1317


Explain document transfer-level security?

1072


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2275


How to run the daily background job s for virsa violations ? thabks in advance

3610


Explain internet-level security?

1084


What is the difference between authorization object and authorization object class?

1083


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4404


What is the difference between the table buffer and the user buffer?

1152


By which parameter number of entries are controlled in the user buffer?

1343


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4151


Can you explain snc in sap security?

1089


What is the use of Personalization tab in SU01?

5622


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7076


What are se10 t-codes used for?

1071