Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.

Answer Posted / subal

Hi ,

this is Subal from Accenture.
ST01 is mainly used to trace user's authorization access.
When we can not make out [by use of SU53]what is missing
for a particular user that he can not access certain things.
We use ST01 to trace the user's action and thereby find out
missing authorizations.

Steps:St01
check authorization check
click on general filter and give user whose trace you want
click on Trace On
save the setting.
---------------------------
Now ask the user to perform the task he was doing --and
complained for missing access.
after his complation
----------------------
Come to st01 again
click on trace off [this is very important to turn it off]
click on analysis button -->give the from date&time and to
date&time accurately.
execute
you will get detailed description of users action with
missing auth [that come with rc >0]

------------------------
note those auth obj and field for which user had issue.
find role and assign the user to give needed access.
--------------------------------
I think this is detailed enough.....

Regards,
SUBAL

Is This Answer Correct ?    17 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we do CUA configuration in Quality system

2366


Explain transport system-level security?

1091


What are some ap security t codes?

1110


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4402


What happens to change documents when they are transported to the production system?

1761


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1081


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1134


Can you explain transport system-level security?

1166


what is the critical issue u are faced in your previous experience

1890


what is hypercare and go live support?

5285


How to create users?

1157


Which tables will you use for making customizing setting for security administration?

1103


What is sap cryptographic library?

1019


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2076


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1334