Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is the use of su56?
what is centralize FFID?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
what is the difference between usobt_c and usobx_c?
when performing client copies what steps you need to take from CUA point of view?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
what is sod in sap security?
Pfcg proposed activities but you need only two. What would you do?
what is the main difference between the derived role and a single role?
Tell me about derived role?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Attributes in SE01?
What are se10 t-codes used for?
What are se09 t-codes used for?
what is use of copy data in derived role and when we use this one ???