Answer Posted / venkat
Hi,
Role conflict can be resolved by using GRC Access Risk
Analysis tool in GRC Access Control(AC) component.
Thanks,
Venkat
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Explain document transfer-level security?
What is sap cryptographic library?
Pfcg proposed activities but you need only two. What would you do?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
What are some ap security t codes?
What is the main purpose of parameters, groups & personalization tabs?
what is hypercare and go live support?
What are the different types of sap security tables?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are se10 t-codes used for?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
How to insert missing authorization?
What is the use of tmssup* rfc destinations?
Differentiate between derived role and composite role