Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
How do we test security systems.
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
How to create users?
Which tables will you use for making customizing setting for security administration?
What is sap’s grc?
Pfcg proposed activities but you need only two. What would you do?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Explain transport system-level security?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What appears as the last sentence in sap note 587410?
What is audit information system?
Differentiate between usobx_c and usobt_c
What does user compare do?