we have one parent role and we derived five roles from that
and i assigned these derived roles to five users now i want
to restrict 2 users for couple of T-codes and rest of the
users work with those T-codes , How we can solve the problem
Answer Posted / seenivasan m u
Possible, restrict the required users in validity parts from and to dates, T-code access available but validity controls, system will be reflect assigned two users only, rest of users not facing any issues on this.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
What is a composite role?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Can you explain secure store and forward?
What is sap cryptographic library?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Explain internet-level security?
Explain protecting public keys?
You want to create and maintain user master record. What authorization would you need?
What is the difference between the table buffer and the user buffer?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What is the difference between authorization object and authorization object class?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Can you explain internet-level security?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.