Q4)
What are the limitations of ST01? Explain in detail?
Answers were Sorted based on User's Feedback
Answer / dineshkannig
Before start the trace we have to know where the user logged in which application server then you have to login to the same application server after this you can start trace.
for that we go to sm51-->execute-->it will list the active servers, first we check for the user is logon in which server, then you will logon that server and perform the trace on the user.
Is This Answer Correct ? | 2 Yes | 1 No |
Answer / sujithkvra
While we performing trace session all the authorizations of that user will be recorded(both existing and missing).
That missing authorizations include both requested and not requested authorization by user,the user(from functional module) will not be aware of the required Authorization Object.
here we(the Security Administrator) has to manually identify the correct Authorization the user required.
Is This Answer Correct ? | 1 Yes | 1 No |
Using which table transaction code text can be displayed?
What are the authorization objects which are always present in user master record?
Which transaction should not be given to BASIS and DEV team in Production?
What is fire fighter ? When we are using fire fighter?
In which table you can see authorization group for table and which table to see authorization group for program?
What is difference between user master record and user buffer
why we are assigining only 312 profiles to the user
What is difference between role certification in role review?
hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
How to find list of roles which are not assigned to any user
What is the difference between Execution and Simulation in grc rar
what is transaction variant?