difference between BRF flat rule in BRF flat rule lineitem by lineitem.
Answer Posted / rajesh srisailapu
Key differences between BRF+ rule and BRF+ flat rule are again summarized below:
BRF+ rule
1.) Executed only once
2.) Complete request details passed to BRF rule by MSMP in form of a table
3.) Output of BRF+ rule is complete table with all lineitems
4.) Complex as compared to flat rule as loop is required
5.) Almost all business cases can be achieved by BRF+ rule
BRF+ Flat Rule
1.) Executed multiple times, Once for each lineitem
2.) Details of one lineitem at a time passed to BRF rule by MSMP
3.)Output of flat rule is result of one line item only
4.) Easy to create as no loop is required
5.) Some of business cases not possible in flat rule
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Any details about secatt apart from SAPSecurity online.com?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?
Differentiate between usobx_c and usobt_c
what is hypercare and go live support?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How we Educated client personnel in R/3 Security and general Basis knowledge
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Explain x-glueb and its use in sap security.
what is user base in sap security?