Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the User Administration and Role Assignment in CUA.

Answer Posted / sujithkvra

User administration talks about Users and related authorizations eg: creation/modification/deletion of users,assigning roles to users etc..

Role administration talks about Roles and authorizations eg: creation/modification/deletion of roles,assigning Authorizations,tcodes etc...to roles

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2524


what things you have to take care before executing run system trace?

1188


What is the use of Personalization tab in SU01?

5620


what is the difference between usobt_c and usobx_c?

1289


how we can see FFID if firefighter not able to see FFids ?

1979


As a SAP security consultant what is the most challenged you faced in previous company?

1047


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2267


What are su22 t-codes used for?

1088


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7067


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2076


How to find out who has deleted users in the system?

1097


What are the different types of sap security tables?

1052


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2086


What are st01 t-codes used for?

1105


Explain internet-level security?

1079