Answer Posted / karun
After an upgrade you may wonder, which T-codes have been affected by this upgrade in respect of their SU24 values (changed t-codes can be reviewed in table prgn_corr2).
As there is no list provided by SAP, you will have to go through SU25, without knowing how much effort this will take.
To have an impression, of which/how many t-codes are affected, you can get this information in your system directly, after you have started SU25->step 2a.
So after executing 2a, you have already the required information in 2 tables.
First select table PRGN_STAT. Select the line with yor current release (after upgrade) from field PRGN_STAT- RELEASE. In field PRGN_STAT-STEP_NR the value should be 002 (after SU25-2a). This first selection is just to make sure, that 2a has been executed already and the following table content is actual for your current release.
Now enter table TCODE_MOD.
In field TCODE_MOD-RELEASE enter your current release (as per PRGN_STAT- RELEASE). Press 'Number of Entries' to be prepared.....
Remark: if your Upgrade includes more than one release, you need to select all the releases between the current and the start release of course.
Executing the selection returns all affected T-codes.
Depending on the t-codes used in your roles you get a first idea of how many changes you will have to perform in SU25 2c.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What does the account assessment category specify in a purchasing document in SAP Materials Management?
By which parameter number of entries are controlled in the user buffer?
How can I do a mass delete of the roles without deleting the new roles?
what are the issues you faced with UME?
Can you explain protecting public keys?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
You want to create and maintain user master record. What authorization would you need?
What is the difference between the table buffer and the user buffer?
Differentiate between saml token profile and a sap logon ticket
Can you explain internet-level security?
Can you explain transport system-level security?
Which transaction should not be given to BASIS and DEV team in Production?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is sap cryptographic library?
How do we test security systems.