Differences between OA 11i and R12 on User Management
Hi All,
Please give some details about differences between OA 11i and R12 on User Management (Role Responsibilities and Role Based Access Control,etc).
Please advise me on this regard.
Moreover,I don't have any Metalink username and Password.
Thanks
New features introduced for User Management (UMX) in R12
The following are the new features introduced in R12 for User Management (UMX):
1)Proxy User:
This new functionality:
· Provides the delegator the ability to grant/revoke the proxy privilege to individuals
· Provide a mechanism throughout the application’s framework where the user can access the proxy switcher feature
· Provide a mechanism throughout the application’s framework which indicates to the user that they are acting as a proxy
· Provide the ability to track the delegate’s actions within the system, while the delegate is acting on behalf of the delegator (Audit)
Benefits of Proxy User:
Ability to delegate proxy authority provides great security controls and Granular control of proxy authority is provided i.e delegate authority can be specified for date ranges
2) ICM (Separation of Duties – SoD) Integration
Oracle User Management is integrated with Oracle Internal Controls Manager (ICM) for the prevention, detection, enforcement, and resolution of separation-of-duties constraints during the assignment of roles by administrators to users.
For example, a constraint (created using a set of ICM UIs) can be defined such that no user is allowed to have "Role A" and "Role B" at the same time. In such a case, anadministrator attempting to assign Role B to a user who already has Role A will be presented with a dialog page displaying the constraint violation information.
At this point, the administrator can take one of two actions:
• Go back to the role assignment page and remove the assignment that is causing the
violation.
• Override the constraint violation, if he has the "AMW: Allow SOD Violation
Override" permission granted to him.
With this permission, the administrator will see Apply and Cancel buttons on the constraint violation dialog page. Clicking Apply will override the constraint, and assign Role B to the user despite the warning. Clicking Cancel will cancel the save operation without granting Role B to the user.
UMX integration with ICM is enabled according to the setting of site-level profile option "UMX: Enable ICM Validation". The default value is "Yes".
3) Enhanced Forget Username/Password Functionality
Forgot Username Functionality is Introduced in R12 along with Forgot Password. So now Users can query on either lost “username” or lost “password” Users should enter email address if lost username and enter username if lost password
Users can now aslo reset username as part of email address verification instead of a two step process.
4)New Registration Process Type for Administrator Role Assignment
New Registration Process Type is introduced for type “Administrator Assisted Additional Access”
Different policies (registration processes) can be used as administrative actions vs. self service requests for
· Approval Routing
· UI
· Notifications
· Business Logic
Simpler registration processes can be created for self-service and administrator flavors
Support for alternative approvals for administrator role assignment is also introduced.
5) Security Wizard Infrastructure
a)Security Wizard Infrastructure
· Infrastructure for product teams to create their own security wizards in context of a role.
· Product teams can create their wizards and seed relevant information
· These wizards appear in list of security wizards available to the administrator when creating/updating role information
b)New User Interface for Delegated Administration
· Existing functionality(11.5.10) of delegated administration setup implemented using wizard infrastructure
· Wizard guides the user through what options they can set for a delegated administration
6) Search Enhancement for List of Value’s (LOV)
Search Enhancements has been made in LOV’s in User management.
a) All LOVs in User Management (UMX) are now searchable by
· Role
· Responsibility
· Both
· Internal Code
b)A type included in the results – to differentiate roles and responsibilities
Similar Messages
-
Difference between BA&T and Enterprise premium (user) License?
Can someone tell me whats the basic difference between these 3 License types, please?
Read bunch of documents and totally confused to figure out what we bought and what we need, thanks.Got clarification from SAP,
"The BA&T SAP Business Objects BI Suite (user) is the same as SAP BusObjects Enterprise Premium (user). Since the version 4.0 the name has evolved to BA&T SAP Business Objects"
BA&T SAP BObj Web Intelligence (user) - Expert users who can edit, view sql, etc.,
Helpful Note: 1861432 -
Difference between SAP SLD and SAP Management console
Hello,
It seems that both System landscape directory and SAP management console have some overlapping features. The services can be started or stopped in both. Is it true? Does anyone know the difference between these 2 and where does Solution manager fit in?
Thanks
ShailikHi,
SAP SLD is the central information provider in a system landscape.this contains both Component information and Landscape description.COMPONENT Info in sense all the sap products and components along with their versions, And also third party products also.LANDSCAPE desc in sense the description of all the systems in particular landscape.
Example:This can shows exact idea for you.Components like CAF,Webdynpo(WD-java),BPM etc info.And the host names,Message server ports etc.Here we dont have start/stop functionality.
SAP MC provides a common framework for centralized system management. It allows you to monitor and perform basic administration tasks on the SAP system centrally, thus simplifying system administration. Using the SAP MC you can
1.Monitor and control (start, stop, or restart) the SAP system and its instances with a single tool
2.Monitor system alerts
3.Display the list of all access points to an SAP system etc.
We can see difference by looking into http://<host name>:<port>/index.html
Look and feel are also differ.
For more info you can go through these links of sap help.
For SAP SLD:http://help.sap.com/saphelp_nw04/helpdata/en/fe/39ae3d47afd652e10000000a114084/frameset.htm
For SAP MC:http://help.sap.com/saphelp_nwce10/helpdata/en/44/c707c053550f2ce10000000a1553f7/frameset.htm
Thanks,
Murthy. -
Difference between Oracle payroll 11i and R12
Hi
Can any one tell me difference between Oracle Payroll 11i and R12, functionally as well as technically.
Thanks
PKHi,
Please refer to these documents.
Note: 561580.1 - E-Business Suite Release 12.1.1: Release Content Documents
Note: 404152.1 - E-Business Suite Release 12: Release Content Documents
Also, see the HRMS User/Implementation guides & the Upgrade guide:
Applications Releases 11i and 12
http://www.oracle.com/technology/documentation/applications.html
Regards,
Hussein -
Difference Between 11i and R12 in Oracle HRMS only
Dear All,
Kindly Provide the differences between 11i and R12 version of HRMS.
Example in 11i there is Retro by Element and in R12 we are using Enhanced Retro.
Kindly share the Knowledge.
Thanks & Regards,
user13073875Srini_Chavali wrote:
You will have to go thru the RCD documents to determine the delta differences.
MOS Doc 1302189.1
HTH
Srini
Isn't this doc already referenced many times in the link posted above by VigneswarBattu? -- https://forums.oracle.com/search.jspa?view=content&resultTypes=&dateRange=all&q=11i%20AND%20R12&rankBy=relevance&content…
Thanks,
Hussein -
Difference between oracle Apps 11i and R12
What is the difference between oracle Apps 11i and R12?
user1121252 wrote:
What is the difference between oracle Apps 11i and R12?https://forums.oracle.com/forums/search.jspa?threadID=&q=11i+vs+R12&objID=c3&dateRange=all&userID=&numResults=15&rankBy=10001
https://forums.oracle.com/forums/search.jspa?threadID=&q=11i+AND+R12+AND+Functional&objID=c3&dateRange=all&userID=&numResults=15&rankBy=10001
https://forums.oracle.com/forums/search.jspa?threadID=&q=11i+AND+R12+AND+Technical&objID=c3&dateRange=all&userID=&numResults=15&rankBy=10001
Thanks,
Hussein -
Architectural difference between 11i and R12
Hello Guys:
I am planning do a training in Oracle Apps very soon. We are running 11.5.10 CU2 and for the most part it won't be upgraded to R12 in at least next 1 year. Now that the R12 is released Oracle has more of R12 trainings than 11i. Given this situation I am in a dilemma has to which version I should be doing the training. 11i or R12.
I firmly believe that unless otherwise there is a huge change in Application Architecture I should go with R12. I went through some of the R12 release notes and to me it looks there is not much of a difference in Architecture between 11i and R12. Do you think my decision to do R12 is wise?
Hussein , your thoughts on this?
Regards,
BalaI went through some of the R12 release notes and to me it looks there is not much of a difference in Architecture between 11i and R12. "Oracle Applications Concepts - R12" manual lists all the new changes/components in Oracle E-Business Suite R12 on the Application, Database, and Desktop tiers.
Oracle Applications Concepts
http://download.oracle.com/docs/cd/B40089_09/current/acrobat/120oacg.pdf
Become Oracle Apps DBA - Difference between Oracle Apps 11i and R12 (Technical)
http://becomeappsdba.blogspot.com/2007/04/difference-between-oracle-apps-11i-and.html
Do you think my decision to do R12 is wise?Sooner or later, you have to :)
Choosing Between Release 12 or 11i
http://blogs.oracle.com/stevenChan/2007/02/choosing_between_release_12_or.html
Oracle E-Business Suite Technology EBS Release 12
http://blogs.oracle.com/stevenChan/applications/release_12/ -
Architectural difference in oracle HRMS 11i and r12
Hi - does anyone have information on the architectural difference between 11i and r12 in oracle hrms??
Hi 924227,
There is not much difference between 11i and R12 with respect to architecture.
Some D2k forms moved to OAF and mainly bug fixes and minor enhancements.
You can find all the details in the below note -
Oracle E-Business Suite HRMS / HCM Information Center [ID 1099813.1]
In Fusion, there will be many changes as a lot of things are incorporated from Pplsoft.
Cheers,
VB -
What is the difference between WEP, WPA, and WPA2? My router is set up on my family PC and connected to a modem so I access Wi-fi through my laptop and my sister has a laptop too and uses our family network to get internet. I just set up a WPA today, so will we all be able to get internet (along with my family using the pc, and my sis on her laptop, even at the same time) protected? (like nobody else using our network)
Wired Equivalent Privacy, commonly called WEP is 802.11's first hardware form of security where both the WAP and the user are configured with an encryption key of either 64 bits or 128 bits in HEX. So when the user attempts to authenticate, the AP issues a random challenge. The user then returns the challenge, encrypted with the key. The AP decrypts this challenge and if it matches the original the client is authenticated. The problem with WEP is that the key is static, which means with a little time and the right tool a hacker could use reverse-engineering to derive the encryption key. It is important to note that this process does affect the transmission speed.
WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion.
WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment.WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.
WPA2 is based upon the Institute for Electrical and Electronics Engineers’ (IEEE) 802.11i amendment to the 802.11 standard, which was ratified on July 29, 2004. The primary difference between WPA and WPA2 is that WPA2 uses a more advanced encryption technique called AES (Advanced Encryption Standard), allowing for compliance with FIPS140-2 government security requirements. -
Difference Between Database Schema and Database User Account ??
First i would like to know what an Oracle Database schema exactly is ?
And what is it for and also What is it's use ?
Later the exact "Difference Between Database Schema and Database User Account".
I googled about it but i'm unable to find out it's The difference,
Please try to explain in a simple manner........
Thank you very Much in Advance..........user13655582 wrote:
Greate example. but i would like add one more point..
a user is a schema and schema is a user. but when this applies to the user that he become a schema, only if he has got some objects. so we can say while creating the user which dosent contain any objects called simple user account but afterwords when he has got an objects then we can say its a schema as the above user has shown you through the exampleIt is just word-play. There is nothing in like a 'status' indicator to say "USER_A is just a user but USER_B has become a schema". Many people use the terms "user" and "schema" interchangeably, and some very good DBAs will insist this is correct. I don't disagree with them even though I usually try to make the distinction.
In a typical application, all of the objects (tables, procedures, etc) that implement the app will be owned by a "application schema owner" - a user which exists for the sole purpose of owning the schema. Said user will have no privileges at all .. especially not CREATE SESSION. Except for possible maintenance activity no one ever actually connects as this user. User accounts are then given to actual humans who connect with their own accounts. The accounts have the necessary system and object privileges granted to them - via a role. One could also create a special account (let's call it APP_ADMIN) that is used for maintenance and batch operations within the application. -
Difference between target schema and target user
hi,
Can anyone explain to me what is the difference between target schema and target user? examples will be more welcome then theoratical explanation.
thanks so muchIn Oracle database schema and user is the same things (if you use general authentication by database).
When used external authentication (for example with Windows domains/active directory) schema is a owner of database objects group and you should specify mapping between external usernames and schema to which this user has access when connects to database.
For example:
- windows domain user CORPDOMAIN\USER1 can connect to oracle database schema SCOTT;
- windows domain user CORPDOMAIN\USER2 can connect to oracle database schema SCOTT;
- windows domain user CORPDOMAIN\ADMIN can connect to oracle database schema SYSTEM;
Oleg
Message was edited by:
tsiboleg -
Difference between dynamic actions and user exit
Hi,
Please help me in when to use table T588z and user exit to write code for dynamic actions.
Thanks,
VenkatHi Prasad,
Find the difference between Dynamic action and user exits.
Dynamic Action User Exits
1. Here only initialization of an infotype 1. Along with initialization of an infotype, depending upon other infotype validation also can be done like in
can be done. IT 16 the contract end date can not be
entered more than 6 months.
2. Less time consuming to write. 2. Require programming approch so more
time consuming.
3. Table T588Z 3. PBAS0001
Br/Manas -
Difference between BADI's and User Exits.
Hi Experts,
I want to know the difference between BADI's and User Exits....
What i know is BADI's are Object oriented But User exits are normal Programs.....i think in User exits also we can write Object oriented program.....
AND one more is BADI's are multiple use but user exits are not,,,,
IF BADI's are multiple use like all BADI's are multiple use or some....is there any performance issues,,,i need to know gurus .......and please provide to me more than this.........
Thanks
VenkatUser exits are some provisional space in the standard program for you to write your own business functionality.
BADI's are soem of the business add-in's that comes along with the standard SAP product but are disabled as most of the customers do not need it. So for those customers who need this will have to activate it and that functionality will be avilable in the transaction.
- guru
Reward points for helpful answers -
Difference between Adhoc package and user created package
what is the difference between Adhoc package and user created package.
Thanks,Hello Asha,
Here are some links which would be helpful for you to get started with BPS
https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs/library/biw/s-u/sap bw business planning and simulation - how to guides list.htm
https://media.sdn.sap.com/public/eclasses/teched04/BW253_files/Default.htm#nopreload=1
https://www.sdn.sap.com/irj/sdn?rid=/webcontent/uuid/3040dd5d-0501-0010-baa8-fc0aafa88c40 [original link is broken]
http://help.sap.com/bp_biv235/BI_EN/html/BW/CostCtrPlan.htm
https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs/library/biw/d-f/enhancements bw-bps formerly sem-bps in sapnetweaver 04.ppt
https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/5d90209f-0501-0010-59a2-9243ac94a4d7
http://help.sap.com/saphelp_nw04/helpdata/en/05/242537cedf2056e10000009b38f936/frameset.htm
Also sent you some useful documents. Please check your mail.
Regards,
Praveen -
Difference between customer exit and user exit?
hi experts
difference between customer exit and user exit?These r the main differences between user exits and customer exits
1) user exits r subroutines where as customer exits r function modules
2) user exits r not upgraded where as customer exits r will upgrade
3) customer exits r used for creating and additional fields or menu items to stadard tcode where as user exits r used for enabling or disabling the fields on the standrd screen or concatenating the key fields,it is not used adding an additional componenats to stadard tcode
4) customer exits r reusable where as user exits r not reusable.
Also:
1. Customer exits: Implemented as Function Modules within z includes. Anybody can change it and no access key is required.
2. User Exit: Implemented as subroutines within includes (any include except y or z includes). You need access for the specific include and then you can any subroutine (user exit) within that Include.
BADIs are the enhanced version of user exits where the same logic is implemented via classes and object (OOP)
Enchancement point is the latest once introduces with ECC6.0 . Not very sure about that but you can change it without any access key.
Please go through the following link which will help you understand the exits in a much better way:
http://help.sap.com/saphelp_nw04/helpdata/en/bf/ec07a25db911d295ae0000e82de14a/content.htm
http://www.sap-img.com/abap/what-is-the-difference-between-smod-and-cmod.htm
http://sap.niraj.tripod.com/id21.html
http://help.sap.com/saphelp_nw04/helpdata/en/c8/1975cc43b111d1896f0000e8322d00/frameset.htm
http://www.sap-img.com/ab038.htm
User Exits.
http://www.erpgenie.com/sap/abap/code/abap26.htm
http://www.sap-img.com/abap/a-short-tutorial-on-user-exits.htm
http://www.sapgenie.com/abap/code/abap26.htm
http://www.sap-img.com/abap/what-is-user-exits.htm
http://wiki.ittoolbox.com/index.php/HOWTO:Implement_a_screen_exit_to_a_standard_SAP_transaction
http://www.easymarketplace.de/userexit.php
http://www.sap-img.com/abap/a-short-tutorial-on-user-exits.htm
http://www.sappoint.com/abap/userexit.pdfUser-Exit
customer exits
https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/f1a7e790-0201-0010-0a8d-f08a4662562d
Menu Exit.
http://www.sappoint.com/abap/spmp.pdf
http://www.sappoint.com/abap/userexit.pdf
http://www.sapdevelopment.co.uk/enhance/mod_sapmenu.htm
http://www.sapdevelopment.co.uk/enhance/enhancehome.htm
1. Previously there were only user-exits.
2. Then came the concept of customer-exits.
3. user exits were nothing but subroutines
FORM/PERFORM
called from standard programs.
4. The FORM defintion was placed inside
an empty include file.
5. So It was called EVERYTIME.
and we need to MODIFY/REPAIR the
standard include .
6. Then it came with concept of customer-exit
7. It consists of calling a FUNCTION MODULE,
which is called only if
the user-exit is ACTIVATED (other wise not called)
In this case, the code in put inside
a pre-defined Z include.
8. Functionality of both is same, howerver
we can note the following important differences
a) Customer exit is called only if activated.
(hence, it does not waste resources)
b) in customer exit, REPAIR does not happen
to the standard include.
Exits are basically the hooks whcih SAP has provided to add your own code.
User Exits: These are provided only SD module .
They are Empty subroutines with naming like USEREXIT_.
We need to have Access key to implement them.
Customer Exits: These are enhancement techniques.
There are defined in SMOD and implemented in CMOD.
Types of Customer exits: Function exit, Screen Exit, Menu exit.
User Exit and Customer Exit are same ,but SAP Exit and Customer exit are different...
Customer Exit,
Enables you to determine values for variables by means of Functional Module exit.The function module used is EXIT_SAPLRRSO_001.
Create a project in CMOD by selecting the SAP Enhancement RSR00001 and assign this to the enhanced proj and activate it.
Customer Exit
SAP creates customer exits for specific programs, screens, and menus within standard applications. These exits do not contain any functionality. Instead, the customer exits act as hooks. You can hang your own add-on functionality onto these hooks.
If you want to enhance the functionality of your SAP System, you should take advantage of the exits available in standard applications. There are two main reasons why you should use exits rather than modifying SAP software yourself. Add-ons attached to exits have the advantage that:
They do not affect standard SAP source code
When you add new functionality to your SAP System using SAPs exits, you do not alter the source code of standard SAP programs in any way. The code and screens you create are encapsulated as separate objects. These customer objects are linked to standard applications, but exist separately from SAPs standard software package.
They do not affect software updates
When you add new functionality to your SAP System using SAPs exits, your objects (called customer objects) must adhere to strict naming conventions. When it comes time to upgrade a to a new software release, customer objects names ensure that they will not be affected by any changes or new additions to the standard software package.
Customer exits are not available for all programs and screens found in the SAP System. You can only use customer exits if they already exist in the SAP System. You find find more information about locating applications with pre-defined exits in Locating Applications that have Exits
http://help.sap.com/saphelp_nw04/helpdata/en/1d/ca10d858c2e949ba4a152c44f8128a/frameset.htm
SAP EXIT:this processing type contained in variables that are delivered with SAP BW business content.
http://help.sap.com/saphelp_nw04/helpdata/en/1d/ca10d858c2e949ba4a152c44f8128a/frameset.htm
User Exits: allow you to add additional functions to the SAP standard.
Programs with user exits contain subroutine calls at certain points in their syntax that are identified by the prefix USEREXIT. The actual user exits are located in an include that has been assigned to a module pool. This is where customers can include any changes (enhancements) that they want to make to the system. These includes are always processed during program flow.
Advantage: In principle, customers can modify anything they want that is found in the include (tables, structures, and so forth).
Disadvantage: SAP cannot check the individual enhancements themselves which often leads to errors
reward points if found useful
regards
palak
Maybe you are looking for
-
How many times can you incorrectly enter your passcode before it is disabled?
My son forget the passcode to his phone after not having it for some time, he doesn't want to permanently disable his phone. How many attempts does he have before he has to connect it to itunes and restore his phone?
-
Can I make a professional e-newsletter using Pages?
I am trying to make a professional e-newsletter to send to my clients using the Pages program. I do not want to send as PDF files. I want the page/newsletter to be directly read in the body of the e-mail. I was wondering if I could just send an HTML
-
I have an annoying adware in my safari browser. How can I get rid of it?
How can I get rid of adware in Safari?
-
How to change database in CR XI Release 2?
I'm using CR 11 Release 2 I created a report pointing to a SQL stored procedure in our 'development' database (called development). I now want to change the report to point to the identically named stored procedure in our 'Production' database. I t
-
SQL Server installation fails when it tries to modify registry
Hi all, I have a clustered Windows 2008 R2 with two nodes. When I try to install SQL Server 2012 in cluster mode, it encounters an error regarding to "unauthorized access". I checked the setup log and saw the following lines: Slp: Creating cluster ne