Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?

Answer Posted / anand

the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.

Is This Answer Correct ?    18 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3705


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2813


Which t-code can be used to delete old security audit logs?

1489


Can you explain internet-level security?

1141


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2654


Attributes in SE01?

2556


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2666


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2354


What is stad?

1179


User is not there in User master record. Then how to trace the user?

1474


what is the difference between usobt_c and usobx_c?

1355


Which transaction should not be given to BASIS and DEV team in Production?

2513


How do we test security systems.

1118


Differentiate between derived role and composite role

1172


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1059