Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

If SU53 screenshot does not give anything then How will you
find the solution? If there is no relevant Role , then How?

Answer Posted / guest

We can user ST01 - system Trace is user for user
authorization issues can be checked.

Here we have Return code based on that we have to work

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is a composite role?

1554


How can I do a mass delete of the roles without deleting the new roles?

1526


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2429


Explain transport system-level security?

1208


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1362


What is the use of tmssup* rfc destinations?

2693


How to codify for an Item in SAP? How many digits are required for an item?

2711


what is use of copy data in derived role and when we use this one ???

1862


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1411


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2874


What is the maximum number of profiles in a role and maximum number of object in a role?

1079


Can wildcards be used in authorizations?

1270


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2211


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1105


As a SAP security consultant what is the most challenged you faced in previous company?

1158