1. What is a role and what is it made up of?
2. How are the authorizations in a role maintained?
3. Are authorization objects or profiles assigned to users?
4. Which authorization object can you use to control an employee’s access to his or her own personal data?
5. What are the main advantages of the Profile Generator?
6. Can roles and their authorization profiles be assigned to a user for a limited time period?
7. How do you create structural profiles?
No comments:
Post a Comment