Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Whay can't you assign a composite role to another composite
role ? Need clear explaintion.

Answer Posted / gaurav.s

Guys you were wrong..a single role without a profile can
also be assigned to a composite role.Basavaraj, i was
looking for a technical reason for this behaviour. Well i
have explore it myself and the correct answer is :

What prevents you from adding a composite into a composite
is that within PFCG is a validation provided through
Function Module PGRN_CHECK_COLLECTIVE_AGR. That FM checks a
few things, one of which being that for the inserted role,
it is not a collective (composite) role defined
via table AGR_FLAGS field COLL_AGR=X.

Join SAP Security Group on Facebook :
https://www.facebook.com/groups/sapsecindia/

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain protecting public keys?

1245


What is the difference between usobx_c and usobt_c?

1058


How to create users?

1200


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1664


what is user base in sap security?

1700


How to find ECC system, GRC system and BI system ?

1203


What does the item category specify in a purchasing order in SAP Materials Management?

1376


how we do CUA configuration in Quality system

2413


What are st01 t-codes used for?

1145


Explain secure store and forward?

1144


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3689


What happens to change documents when they are transported to the production system?

1807


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2118


What are su56 t-codes used for?

1243


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2283