Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

how to transport roles?

Answer Posted / pradeep

Hi guys,

Now-a-days there are using CHaRM Process in maximum projects,its an advanced tool for transporting the roles.
So guys please have a good knowledge on that.

Best Regards,
Pradeep

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the main purpose of parameters, groups & personalization tabs?

1120


What is a composite role?

1454


how you can delete multiple roles from qa, dev and production system?

1301


Support types of WOs you have faced?

2304


Explain x-glueb and its use in sap security.

1357


what is your ticketing tool? can we give some details about how we are getting tickets

1602


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

1201


What is the difference between c (check) and u (unmaintained)?

1884


Is it possible to have more than one st of org-level values in one role? Explain your answer.

1095


What is the difference between authorization object and authorization object class?

1131


What is audit information system?

1133


What are su53 t-codes used for?

1370


Pfcg proposed activities but you need only two. What would you do?

1126


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3703


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2348