in my production system there are some 20 roles created in
the production system itself without following the standard
procedure of creating in dev testing it qas and then moving
it to prd.so how do you find out all the roles created in
prd system?

Answer Posted / kasata

cOMPARE THE OUTPUT OF agr_define TABLE IN DEV AND PROD
SYSTEMS EXTERNALLY IN AN EXCEL SHEET. WE WILL FIND THE ROLES
THAT DO NOT CO EXIST IN DEV SYSTEMS.

BUT RESULTS WILL NOT BE ACCURATE IF ROLES HAVE LATER BEEN
DOWNLOADED FROM PROD AND UPLOADED INTO DEV SYSTEMS

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between role and a profile?

725


Explain sap system transactions?

696


what is the different b/w su10 and su12

2168


what is the difference between usobt_c and usobx_c?

766


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

1743






Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2117


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

647


What authorization are required to create and maintain user master records?

659


What are the uses of an authorization group?

701


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1673


What is sap’s grc?

710


what is your ticketing tool? can we give some details about how we are getting tickets

1150


What appears as the last sentence in sap note 587410?

649


Explain internet-level security?

630


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1693