Mention which t-codes are used to see the summary of the authorization object and profile details?
Answer Posted / madhu
su02- summery of authorization profile
su03- summery of authorization objects
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is sap cryptographic library?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to codify for an Item in SAP? How many digits are required for an item?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Any details about secatt apart from SAPSecurity online.com?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is the use of su56?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Pfcg proposed activities but you need only two. What would you do?
What is the use of Personalization tab in SU01?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Attributes in SE01?
what are all the questions covered in "profiles related concepts " please let me know ?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'