can we restrict access through tcode added manually in
authorisation data in creating a role?
Answers were Sorted based on User's Feedback
Answer / deepak popalkar
Object S_USER_TCD controls the access of tcodes that user
can include while creating role. So if we want user to
includes no tcodes in role then we can make this object
inactive.
Is This Answer Correct ? | 2 Yes | 2 No |
Answer / karunakar
Hello,
As per my knowledge we can restrict the access by adding
tcode manually
go to the authorization tab -- change authorization data---
go to s-tcode object in cross application--- give the values
which t code you want to restrict ex-- su01 give the values
a* - st*, suoo*-- su02*, 0-9
i hope this will help to your question ,
Please let me know if i am wrong
Is This Answer Correct ? | 0 Yes | 1 No |
What is Use Of SM35P and SM35 , Is there any difference between these two ?
Hello All, Can any one tell me what are the sap tables will be used while trouble shooting authorization issue BW security activity
i want to delete 1000 users of a particular client,hou can i do it ?
How I can reset the DDIC user's password? I have changed it from the delivered default?
i am asked to get through at "Authorizations analysis and correct assignments" wat does it mean and wat all concepts comes under these ?
what is difference between master role and derived role
1. what is the difference b/w change authorization mode and expert mode. 2.when we do the user comparison in pfcg what is the difference in complete comparison and expert mode comparison. 3. what are the critical auth objects in security point of you , 4.when we do the transportation of composite role what will happened . 5.while doing the kernel upgrade we download the executable s one by one are all together. 6. while applying the patches what is the importance of test import why we do test import
What is the maximum number of authorization objects in a role?
under description ; in creating a role what should be written over there ....what does ur company follows ??
how a t code works
What is Sap security t-codes?
Pfcg proposed activities but you need only two. What would you do?