Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?

Answer Posted / anand

the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.

Is This Answer Correct ?    18 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

User is not there in User master record. Then how to trace the user?

1470


Differentiate between usobx_c and usobt_c

1156


How we Educated client personnel in R/3 Security and general Basis knowledge

2271


What are su22 t-codes used for?

1137


How to insert missing authorization?

1138


What is the use of tmssup* rfc destinations?

2610


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2448


what is the use of defaults tab in start menu

1893


what are all the questions covered in "profiles related concepts " please let me know ?

2118


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2665


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2583


Explain secure store and forward?

1173


You want to remove a developer's and developer keys from a system. How would you do that?

1098


Explain snc in sap security?

1188


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2159