In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?
Answer Posted / gaurav
1> You'll need to check if the transaction that is being
requested is available in the system i.e if it exists or
not. You'll have to check this thru transaction SE93.
[If not then the ABAP team needs to get this transaction
coded into the system]
2> If transaction does exists and if you are not able to
find this in any production/ end user roles, then you'll
have to see if you can find any ViewName/ Table Name linked
to this transaction [this would be on the same screen i.e.
SE93 at the bottom]
3> If a ViewName is available then this means that this new
transaction will be interacting with the table you found
and hence the object S_TABU_DIS and SU24 change will come
into picture.
4> You then need to take a trace yourself in Development
system by executing this transaction and check the trace
report for the activities that show up.
[Note: Remember to undo whatever you have saved]
5> Take appropriate approval for role modification as per
process you follow in your organization.
6> Make SU24/ role changes in development system and have
these changes moved till Quality or Fix system for testing
purpose. Create test ID's accordingly.
7> If testing fails, get SU53 report and redo analysis. If
testing is successful create production/ end user roles,
make a TP request and get your changes moved till
production system.
Is This Answer Correct ? | 7 Yes | 3 No |
Post New Answer View All Answers
How do we test security systems.
Differentiate between derived role and composite role
How to create users?
Differentiate between usobx_c and usobt_c
What are the upgrades happened in GRC 5.3 from GRC 5.2?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
What is the use of Personalization tab in SU01?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
What does the profile generator do?
how to do Reporting and Analysis authorizations
What is the difference between c (check) and u (unmaintained)?
Any details about secatt apart from SAPSecurity online.com?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what are the issues you faced with UME?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this