i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.
Answer Posted / subal
Hi ,
this is Subal from Accenture.
ST01 is mainly used to trace user's authorization access.
When we can not make out [by use of SU53]what is missing
for a particular user that he can not access certain things.
We use ST01 to trace the user's action and thereby find out
missing authorizations.
Steps:St01
check authorization check
click on general filter and give user whose trace you want
click on Trace On
save the setting.
---------------------------
Now ask the user to perform the task he was doing --and
complained for missing access.
after his complation
----------------------
Come to st01 again
click on trace off [this is very important to turn it off]
click on analysis button -->give the from date&time and to
date&time accurately.
execute
you will get detailed description of users action with
missing auth [that come with rc >0]
------------------------
note those auth obj and field for which user had issue.
find role and assign the user to give needed access.
--------------------------------
I think this is detailed enough.....
Regards,
SUBAL
| Is This Answer Correct ? | 17 Yes | 0 No |
Post New Answer View All Answers
how we do CUA configuration in Quality system
Explain transport system-level security?
What are some ap security t codes?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What happens to change documents when they are transported to the production system?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Can you explain transport system-level security?
what is the critical issue u are faced in your previous experience
what is hypercare and go live support?
How to create users?
Which tables will you use for making customizing setting for security administration?
What is sap cryptographic library?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What does the account assessment category specify in a purchasing document in SAP Materials Management?