Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answers were Sorted based on User's Feedback
Answer / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
Is This Answer Correct ? | 18 Yes | 0 No |
Answer / aradhana
we go to the Tcode SUIM--PROFILE--BY AUTHORIZATION VALUE--
S_TCODE--PARTICULAR TCODE,,,,This will provide us with a
list of profiles having that tcode.we can check activities
of some profiles by double click on them and then can
choose profile of our interest.
Is This Answer Correct ? | 1 Yes | 3 No |
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Explain how you can lock all the users at a time in SAP?
Explain snc in sap security?
What is Sap security t-codes?
how segregation of duties in sap security?
When would you update a sap table directly? What precautions would you taje?
what is the procedure to delete a role?
6 Answers Cap Gemini, IBM, iGate,
what Troubleshooting we get these transactions like SU53, ST01, SUIM and ST22
1 .what are the authorization switches in security
how v Check SOD conflicts through VRAT
Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity
what is the profile