i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.
Answer Posted / prakash
Hi,
I partially agree with Subal, need to follow below 2 points
before performing all the steps mentioned above by Subal.
- First we need to check in which application server user
has logged in.
- Using SM51 tcode, you need to login same application
server where user logs in.
- Then perform trace activity
Is This Answer Correct ? | 10 Yes | 0 No |
Post New Answer View All Answers
Explain transport system-level security?
What is the difference between c (check) and u (unmaintained)?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Any details about secatt apart from SAPSecurity online.com?
Can you explain internet-level security?
Differentiate between saml token profile and a sap logon ticket
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is Sap security t-codes?
What is the maximum number of profiles in a role and maximum number of object in a role?
what are the issues you faced with UME?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
How to assign any program to user?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
How to do Role Design, Testing and Implementation