1. what is the difference b/w change authorization mode and
expert mode.
2.when we do the user comparison in pfcg what is the
difference in complete comparison and expert mode comparison.
3. what are the critical auth objects in security point of you ,
4.when we do the transportation of composite role what will
happened .
5.while doing the kernel upgrade we download the executable
s one by one are all together.
6. while applying the patches what is the importance of test
import why we do test import

Answer Posted / itsgaurav151

Ans.1 - Change auth mode opens the last saved authorizations
for change. If any new t-code is added to that role
then change auth only
adds the relevant objects in role for the new t-code.

Expert mode has three options detailed below:
1) Delete old auth and create new - This will delete all old
auth data except org values and will create new
authorization by including the objects maintained for t-
codes of role in SU24.

2) Edit Old Status- This will open last saved auth for
change with any change/addition of relevant
objects if you have added any new t-code to role.

3) Edit old status and merge with new - It will include the
new objects for newly added t-code in role and also
compares the objects for old t-codes of role and includes
in role the missing object/auth values if any, deleted
earlier due to any reason. New added auth objects will
have the status new.Updated auth objects will get the
status updated. Old objects not change will have the
status old.

Is This Answer Correct ?    20 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

707


What are se09 t-codes used for?

699


You want to remove a developer's and developer keys from a system. How would you do that?

634


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

1631


Can wildcards be used in authorizations?

701






How we Provided Security design, configuration, and support for SAP Enterprise Portals

1775


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

3987


Explain transport system-level security?

644


How can I do a mass delete of the roles without deleting the new roles?

848


Differentiate between temp role and copy role

700


how you can delete multiple roles from qa, dev and production system?

812


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

6362


what is the main difference between the derived role and a single role?

687


Which transaction should not be given to BASIS and DEV team in Production?

1909


When would you update a sap table directly? What precautions would you taje?

730