we have one parent role and we derived five roles from that
and i assigned these derived roles to five users now i want
to restrict 2 users for couple of T-codes and rest of the
users work with those T-codes , How we can solve the problem
Answer Posted / annavarapu
first we need to add those t-codes for the users who required
access to execute and then remove the codes from the roles.
Automatically the users who doesn't required the t-code access
will workout
Is This Answer Correct ? | 0 Yes | 7 No |
Post New Answer View All Answers
what is user base in sap security?
how we do CUA configuration in Quality system
How we Educated client personnel in R/3 Security and general Basis knowledge
Explain document transfer-level security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How to do Role Design, Testing and Implementation
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the use of tmssup* rfc destinations?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What does the profile generator do?
Pfcg proposed activities but you need only two. What would you do?
What happens to change documents when they are transported to the production system?
How to find ECC system, GRC system and BI system ?
How to find out who has deleted users in the system?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)