Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answers were Sorted based on User's Feedback
Answer / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
Is This Answer Correct ? | 18 Yes | 0 No |
Answer / aradhana
we go to the Tcode SUIM--PROFILE--BY AUTHORIZATION VALUE--
S_TCODE--PARTICULAR TCODE,,,,This will provide us with a
list of profiles having that tcode.we can check activities
of some profiles by double click on them and then can
choose profile of our interest.
Is This Answer Correct ? | 1 Yes | 3 No |
Any details about secatt apart from SAPSecurity online.com?
Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.
What are the issues will face while creating user in the system ?
When would you update a sap table directly? What precautions would you taje?
what are the profiles that are related to transports ? what are the A.O related to transports ?
Can any one tell me briefly , what is the roles and responsibilities of SAP BASIS Security Administrator..
Why is it important to delete sap-new profile? What steps will you take to do this?
How to find list of authorization objects which having org fields?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE