i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.

Answer Posted / prakash

Hi,
I partially agree with Subal, need to follow below 2 points
before performing all the steps mentioned above by Subal.

- First we need to check in which application server user
has logged in.
- Using SM51 tcode, you need to login same application
server where user logs in.
- Then perform trace activity

Is This Answer Correct ?    10 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain transport system-level security?

642


What is the difference between c (check) and u (unmaintained)?

1082


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1873


Any details about secatt apart from SAPSecurity online.com?

1909


Can you explain internet-level security?

647






Differentiate between saml token profile and a sap logon ticket

851


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

598


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3046


What is Sap security t-codes?

716


What is the maximum number of profiles in a role and maximum number of object in a role?

622


what are the issues you faced with UME?

2445


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

541


How to assign any program to user?

1057


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2272


How to do Role Design, Testing and Implementation

2039