In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM
Answer Posted / abcsecurity
We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.
Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure
Is This Answer Correct ? | 4 Yes | 9 No |
Post New Answer View All Answers
what is use of copy data in derived role and when we use this one ???
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
How to find ECC system, GRC system and BI system ?
Which transaction code is used to display the user buffer?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Pfcg proposed activities but you need only two. What would you do?
Explain snc in sap security?
What are the different types of sap security tables?
what is centralize FFID?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
What does the pfcg_time_dependency clean up?
What is the difference between c (check) and u (unmaintained)?
How to run the daily background job s for virsa violations ? thabks in advance
How do we test security systems.