Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answers were Sorted based on User's Feedback
Answer / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
Is This Answer Correct ? | 18 Yes | 0 No |
Answer / aradhana
we go to the Tcode SUIM--PROFILE--BY AUTHORIZATION VALUE--
S_TCODE--PARTICULAR TCODE,,,,This will provide us with a
list of profiles having that tcode.we can check activities
of some profiles by double click on them and then can
choose profile of our interest.
Is This Answer Correct ? | 1 Yes | 3 No |
I want a list of users along with roles for a client ? hou to do it?
one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?
How we Assigning roles to users positions in HR, troubleshoot access issues
how to do Assigning authorization groups for table restrictions and program restrictions.
your functional team has asked you to provide the seurity for a tcode.how do you go about it?
hi..guys... can u tell me? what is the solution manager.. and what is the use? which type of commands we should follow?
What is the User Administration and Role Assignment in CUA.
what is the difference between adding tcode in menu and adding tcode using s_tcode ?
3 Answers Pepsi, Tech Mahindra,
What is the differrence b/w Copy Roles and Derived Roles ?
Mention which t-codes are used to see the summary of the authorization object and profile details?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
As a SAP security consultant what is the most challenged you faced in previous company?