SU25 Step6 How Roles are created through Profiles?
Answer Posted / shanu
If you do decide to use SU25 Step 6 to convert the Manual
profiles to activity groups, you will need to watch out for
the following “gotchas”:
Naming convention (T_500yyyyy_previous name)
All activity groups created before SU25 is run, are renamed
to T_500yyyyy_previous name.
See OSS note 156196 for additional information and
procedures to rename the activity groups back to their
original names using program ZPRGN_COPY_T_RY_ARGS.
Carefully review information regarding the loss of links
between profiles and user master records.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What are the uses of an authorization group?
How to find ECC system, GRC system and BI system ?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Explain x-glueb and its use in sap security.
Is it possible to change role template? How?
How to do Role Design, Testing and Implementation
Which t-code can be used to delete old security audit logs?
What is the difference between role and a profile?
What is sap’s grc?
Can wildcards be used in authorizations?
Differentiate between temp role and copy role