i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.
Answers were Sorted based on User's Feedback
Hi ,
this is Subal from Accenture.
ST01 is mainly used to trace user's authorization access.
When we can not make out [by use of SU53]what is missing
for a particular user that he can not access certain things.
We use ST01 to trace the user's action and thereby find out
missing authorizations.
Steps:St01
check authorization check
click on general filter and give user whose trace you want
click on Trace On
save the setting.
---------------------------
Now ask the user to perform the task he was doing --and
complained for missing access.
after his complation
----------------------
Come to st01 again
click on trace off [this is very important to turn it off]
click on analysis button -->give the from date&time and to
date&time accurately.
execute
you will get detailed description of users action with
missing auth [that come with rc >0]
------------------------
note those auth obj and field for which user had issue.
find role and assign the user to give needed access.
--------------------------------
I think this is detailed enough.....
Regards,
SUBAL
Is This Answer Correct ? | 17 Yes | 0 No |
Hi,
I partially agree with Subal, need to follow below 2 points
before performing all the steps mentioned above by Subal.
- First we need to check in which application server user
has logged in.
- Using SM51 tcode, you need to login same application
server where user logs in.
- Then perform trace activity
Is This Answer Correct ? | 10 Yes | 0 No |
how to transport roles?
what is user buffer?
how to view the su53 screen for other users?
What is a Role in Sap Security and Types of Roles and use of the role?
What does the item category specify in a purchasing requisition in SAP Materials Management?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what is hypercare and go live support?
how we do CUA configuration in Quality system
hOW many users limit in su10
3 Answers Accenture, Cap Gemini, Hexaware,
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is the difference between usobt_c and usobx_c?
whats the meaning of relocation in transport request ?