1. what is the difference b/w change authorization mode and
expert mode.
2.when we do the user comparison in pfcg what is the
difference in complete comparison and expert mode comparison.
3. what are the critical auth objects in security point of you ,
4.when we do the transportation of composite role what will
happened .
5.while doing the kernel upgrade we download the executable
s one by one are all together.
6. while applying the patches what is the importance of test
import why we do test import

Answer Posted / giridhar

1)f new authorization created threw change authorization.If
you edit the old authorization and add the the new
authorization we can use export mode.
2)This is also same for first if you create new role in pfcg
you can use user comparison,is you change the old role and
giving the new changes we can use the expert mode comparison.
3)S_DEVELOP, S_PROGRAM, S_ADMI_FCD
4)If you insert in composite role in transport request
automatically child roles also included in transport request.
5)All together.
6)If you test import is success means the patch uploaded
successfully.

Is This Answer Correct ?    3 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to do Role Design, Testing and Implementation

2039


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1639


how to do Reporting and Analysis authorizations

1898


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

699


Can you explain document transfer-level security?

668






DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

1828


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

833


Explain document transfer-level security?

674


How to assign any program to user?

1059


How to insert missing authorization?

669


what is user base in sap security?

1142


What is the use of su56?

693


What is a composite role?

812


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2362


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1702