Q4)
What are the limitations of ST01? Explain in detail?
Answers were Sorted based on User's Feedback
Answer / dineshkannig
Before start the trace we have to know where the user logged in which application server then you have to login to the same application server after this you can start trace.
for that we go to sm51-->execute-->it will list the active servers, first we check for the user is logon in which server, then you will logon that server and perform the trace on the user.
Is This Answer Correct ? | 2 Yes | 1 No |
Answer / sujithkvra
While we performing trace session all the authorizations of that user will be recorded(both existing and missing).
That missing authorizations include both requested and not requested authorization by user,the user(from functional module) will not be aware of the required Authorization Object.
here we(the Security Administrator) has to manually identify the correct Authorization the user required.
Is This Answer Correct ? | 1 Yes | 1 No |
How we Check if the PFCG_TIME_DEPENDENCY is running for user master reconciliations.
Can you explain sap system transactions?
I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
1) Explain me about your SAP Career? 2) Tell me your daily monitoring jobs and most of them you worked on? 3) which version of SAP are you working on? Is it a java stack or abap stack? 4) Tell me about derived role? 5) what is the main difference between single role and a derived role 6) Does s_tabu_dis org level values in a master role gets reflected in the child role?? 7) Tell me the steps to configure CUA? 8) Is RAR a java stack or Abap Stack? 9) What is the report which states the critical T-codes? and also What is the T-code? 10) What is the T-code to get into RAR from R/3? 11) Explain about SPM?
When transporting a role. What table & table data gets transported. Exact table names please?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?
How we schedule and administering background jobs?
What is the use of tmssup* rfc destinations?
Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
What is the difference between c (check) and u (unmaintained)?