How to trace the Users in BI Security and give me
navigation
Answers were Sorted based on User's Feedback
Answer / ramamohan53200
Above answer is some what correct but before checking the
particular user authorization log / Error log that user
needs to be added in the users list.
Then only we can see that particular user authorization log
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jordan
We can trace the admin user through ST01, but for the reporting users we need to go to RSECADMIN --> ANALYSIS TAB --> EXECUTE AS.
Then give the user name and chk "with log", Click on start transaction by giving the query name.
If there are more number of users on the same ANALYSIS TAB click on error logs.
We can find the logs in Generation logs
Is This Answer Correct ? | 2 Yes | 1 No |
what is the process to find that one consultant had removed a table from sap tables
which table is used to store illegal passwords?
Can you explain composite role?
what is sox and in sap security?
Hi Everyone, can anyone suggest the best institute in Ameerpet, HYD for SAP Security Course. Thnks Ankur
what is the user table including account number and cost center in one table?
What are pfud t-codes used for?
how to delete a role?
hOW many users limit in su10
3 Answers Accenture, Cap Gemini, Hexaware,
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Can we delete a Role and transport it?Explain How?