Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answers were Sorted based on User's Feedback
Answer / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
Is This Answer Correct ? | 18 Yes | 0 No |
Answer / aradhana
we go to the Tcode SUIM--PROFILE--BY AUTHORIZATION VALUE--
S_TCODE--PARTICULAR TCODE,,,,This will provide us with a
list of profiles having that tcode.we can check activities
of some profiles by double click on them and then can
choose profile of our interest.
Is This Answer Correct ? | 1 Yes | 3 No |
What are su53 t-codes used for?
I have to create 1000 users. how do you do it?
Some User has made changes to Tables in SAP. How to identify that user?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
how to delete a role?
Does anyone know what kind of questions does the Accenture asks on Interview as SAP Security Consultant?
what is use of su56?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is difference between user master record and user buffer
What does the item category specify in a purchasing requisition in SAP Materials Management?
difference between business view n technical view?
What is the difference between c (check) and u (unmaintained)?