Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answer Posted / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
| Is This Answer Correct ? | 18 Yes | 0 No |
Post New Answer View All Answers
User is not there in User master record. Then how to trace the user?
Differentiate between usobx_c and usobt_c
How we Educated client personnel in R/3 Security and general Basis knowledge
What are su22 t-codes used for?
How to insert missing authorization?
What is the use of tmssup* rfc destinations?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
what is the use of defaults tab in start menu
what are all the questions covered in "profiles related concepts " please let me know ?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Explain secure store and forward?
You want to remove a developer's and developer keys from a system. How would you do that?
Explain snc in sap security?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?