a user is not able to execute a t-code ; hou do u solve
that ? wat are the difft reasons that might be existing ?
Answer Posted / nipun mohendroo
First, the SAP System checks in Table TSTC whether there
exists any such transaction.
If so, it checks whether the transaction is locked or not
(SM01).
Then it checks whether user has an entry of the transaction
being executed in S_TCODE in his/her auth. data.
Then if any further auth. checks are listed for that
particulat transaction, then table TSTCA would be checked
for the same.
after all above checks the user might be able to run a
particular transaction.
User also needs to have the correct field values assigned
in the master record in case the same is listed for the
particular transaction code-auth. object/value matrix.
| Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
what things you have to take care before executing run system trace?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What are su22 t-codes used for?
What is the difference between c (check) and u (unmaintained)?
Explain secure store and forward?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Can you explain transport system-level security?
Differentiate between derived role and composite role
What is the difference between authorization object and authorization object class?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How to run the daily background job s for virsa violations ? thabks in advance
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What are su56 t-codes used for?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
What does user compare do?