In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM
We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.
Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure
Is This Answer Correct ? | 4 Yes | 9 No |
How many Single roles can be added in one Composite role ?
Difference between S_tcode and Menu tab transactions?
One of the user logged into Production System, changed a table and then logged out. How will you track him?
2 Answers Atos Origin, Infosys,
What is the difference between c (check) and u (unmaintained)?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Scheduled a job for user master reconciliation , a user is in a validity date and roles assigned to that user are in validity date, but for reasons roles has been removed from the user master record, what could be the reason, this is not related to position based security, could some explain?
hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time
one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?
In which table you can see authorization group for table and which table to see authorization group for program?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
User tring to submit the request in GRC but user getting error, what could be the reason , while all BRF+ & MSMP working fine.?
for eaxmple we are creating Z-Tcode How to restrict and what level are restict.