In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM

Answer Posted / abcsecurity

We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.

Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure

Is This Answer Correct ?    4 Yes 9 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is use of copy data in derived role and when we use this one ???

1332


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

674


How to find ECC system, GRC system and BI system ?

787


Which transaction code is used to display the user buffer?

673


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2364






Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

1618


Pfcg proposed activities but you need only two. What would you do?

668


Explain snc in sap security?

707


What are the different types of sap security tables?

664


what is centralize FFID?

1538


What does the account assessment category specify in a purchasing document in SAP Materials Management?

928


What does the pfcg_time_dependency clean up?

806


What is the difference between c (check) and u (unmaintained)?

1094


How to run the daily background job s for virsa violations ? thabks in advance

3159


How do we test security systems.

652