how to secure the customizing Tcodes in sap

Answer Posted / prakash

1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1677


How do we test security systems.

652


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

3987


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2231


How to create users?

726






Which tables will you use for making customizing setting for security administration?

709


What is sap’s grc?

723


Pfcg proposed activities but you need only two. What would you do?

666


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

674


Explain transport system-level security?

644


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3746


What appears as the last sentence in sap note 587410?

660


What is audit information system?

717


Differentiate between usobx_c and usobt_c

625


What does user compare do?

688