How to get the list of tcodes having by all users(EX-20
users)at a time?(through SUIM or TABLE)
[we can get single user through SUIM->TRANSACTIONS-
>EXECUTABLE USER....but same thing i want for multiple
users at a time)
Answer Posted / nakulsn
If you go via Tables, it will pull data for roles that are
expired in user master.
Therefore, the best way is to go to SUIM -> Users by complex
selection criteria: put in the list of users in user ID
field, through multiple selection.
In one of the authorization object fields on that screen,
put in s_tcode, hit enter and execute blank.
This will get the list of all executable transactions for users.
You can pull through tables, all the roles assigned to those
users through multiple selection, then put in the list of
roles in AGR_1251 with Object as s_tcode and field name tcd.
Before pulling this data from AGR_1251, you'll need to
filter out the roles for which the validity is already
expired in user master of these user IDs.
| Is This Answer Correct ? | 1 Yes | 5 No |
Post New Answer View All Answers
How to update risk id in rule set?
How can sap security be improved?
How can I do a mass delete of the roles without deleting the new roles?
What profile versions?
What are su53 t-codes used for?
Explain sap system transactions?
What does the pfcg_time_dependency clean up?
What does the item category specify in a purchasing order in SAP Materials Management?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
what is your ticketing tool? can we give some details about how we are getting tickets
What is sap cryptographic library?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Which transaction code is used to display the user buffer?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects