How to trace the Users in BI Security and give me
navigation
Answers were Sorted based on User's Feedback
Answer / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jordan
We can trace the admin user through ST01, but for the reporting users we need to go to RSECADMIN --> ANALYSIS TAB --> EXECUTE AS.
Then give the user name and chk "with log", Click on start transaction by giving the query name.
If there are more number of users on the same ANALYSIS TAB click on error logs.
We can find the logs in Generation logs
Is This Answer Correct ? | 2 Yes | 1 No |
what are various user types
What is Use Of SM35P and SM35 , Is there any difference between these two ?
Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?
What are the critical tables in BI Security
Authorization check on s_btch_job failed. What would happen now?
One of the user logged into Production System, changed a table and then logged out. How will you track him?
2 Answers Atos Origin, Infosys,
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
Could any one tell me "What is critical authorizations in sap security"?
Does s_tabu_dis org level values in a master role gets reflected in the child role?
1).what is the diff b/w adding the tcode in s_tcode authorization object and addind the tcode inmenu tab of pfcg? 4) What is the difference between Owner, Controller and Administrator in Firefighter? 2) Can you tell me why do you use S_TABU_DIS authorization object? 3) Explain How do you restrict a particular table acces then? 5)In RAR ,What are the default Back ground Jobs? 6)Which job will update all user master records? 7)What will happen whenever we execute a t-code? 8)What is the purpose of the report RSUSR006? 9) Lets say a user is locked by admin? What value will you see in USR02 table and in UFLAG column? 10) What will you do if the user complains that he is not able to access a t-code? 11)why we have to delete users ? 12)a. What is Direct role assignment and indirect role assignment? b. What is the process of adding a t-code to an existing role? c. If client asked you to modify a role directly in PRODUCTION for emergency? Is it possible? What you will do in that situation? d. What is the purpose of customized Transaction codes? Have you created any custom t-codes? 13)
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help