In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM
Answer Posted / abcsecurity
We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.
Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure
| Is This Answer Correct ? | 4 Yes | 9 No |
Post New Answer View All Answers
You want to remove a developer's and developer keys from a system. How would you do that?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
when performing client copies what steps you need to take from CUA point of view?
what is the process to find that one consultant had removed a table from sap tables
Can you explain network topology in sap systems?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Differentiate between temp role and copy role
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
What are some ap security t codes?
You want to create and maintain user master record. What authorization would you need?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the difference between role and a profile?
How to update risk id in rule set?