Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

a user is not able to execute a t-code ; hou do u solve
that ? wat are the difft reasons that might be existing ?

Answer Posted / nipun mohendroo

First, the SAP System checks in Table TSTC whether there
exists any such transaction.
If so, it checks whether the transaction is locked or not
(SM01).
Then it checks whether user has an entry of the transaction
being executed in S_TCODE in his/her auth. data.
Then if any further auth. checks are listed for that
particulat transaction, then table TSTCA would be checked
for the same.
after all above checks the user might be able to run a
particular transaction.
User also needs to have the correct field values assigned
in the master record in case the same is listed for the
particular transaction code-auth. object/value matrix.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what things you have to take care before executing run system trace?

1238


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1179


What are su22 t-codes used for?

1129


What is the difference between c (check) and u (unmaintained)?

1865


Explain secure store and forward?

1144


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2571


Can you explain transport system-level security?

1221


Differentiate between derived role and composite role

1153


What is the difference between authorization object and authorization object class?

1109


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1461


How to run the daily background job s for virsa violations ? thabks in advance

3642


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2442


What are su56 t-codes used for?

1244


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2318


What does user compare do?

1191