Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answer Posted / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
| Is This Answer Correct ? | 18 Yes | 0 No |
Post New Answer View All Answers
Explain x-glueb and its use in sap security.
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What are some ap security t codes?
How can I do a mass delete of the roles without deleting the new roles?
what is the use of defaults tab in start menu
What is the procedure for role modifications?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
How can sap security be improved?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What are pfud t-codes used for?
what are all the questions covered in "profiles related concepts " please let me know ?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
how to do Reporting and Analysis authorizations