Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the difference between copied and derived role?

Answer Posted / pradeep

Copied Role: In this is just we copy the role from existing
role but in further any changes in the role is not effect to copied Role.

Derived Role: It also derived from Parent Role (already existed)to a child role(derived role) after that when we make changes in parent role changes will effect to derived role


that's why instead of role copy we prefer the derived concept.

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

By which parameter number of entries are controlled in the user buffer?

1455


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2290


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1122


Can you explain sap system transactions?

1187


What is a composite role?

1553


what is the different b/w su10 and su12

3028


What authorization is required to create and maintain user master records?

1155


What are se10 t-codes used for?

1185


Explain document transfer-level security?

1182


What are su25 t-codes used for?

1291


What are su22 t-codes used for?

1196


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1362


What are the different types of sap security tables?

1156


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7251


how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2548