Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

i have one role in development then this role need to be available in production how to achieve this?

Answer Posted / shankarreddy08

We should never do any changes directly in the production system. The procedure is as follows .Dev -->QA-->Prod. I hope no Business Onwers will entertain to move directly to production.

Is This Answer Correct ?    7 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2695


what is authorization object and authorization object class?

1325


What is the difference between c (check) and u (unmaintained)?

1951


What are su53 t-codes used for?

1436


Can wildcards be used in authorizations?

1269


what is sod in sap security?

1294


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1122


Can you explain sap system transactions?

1188


Which t-code can be used to delete old security audit logs?

1538


How we schedule and administering background jobs?

1200


What does user compare do?

1260


What authorization are required to create and maintain user master records?

1196


What are some ap security t codes?

1221


what is the main difference between the derived role and a single role?

1204


Can you explain protecting public keys?

1120