i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.
Answer Posted / subal
Hi ,
this is Subal from Accenture.
ST01 is mainly used to trace user's authorization access.
When we can not make out [by use of SU53]what is missing
for a particular user that he can not access certain things.
We use ST01 to trace the user's action and thereby find out
missing authorizations.
Steps:St01
check authorization check
click on general filter and give user whose trace you want
click on Trace On
save the setting.
---------------------------
Now ask the user to perform the task he was doing --and
complained for missing access.
after his complation
----------------------
Come to st01 again
click on trace off [this is very important to turn it off]
click on analysis button -->give the from date&time and to
date&time accurately.
execute
you will get detailed description of users action with
missing auth [that come with rc >0]
------------------------
note those auth obj and field for which user had issue.
find role and assign the user to give needed access.
--------------------------------
I think this is detailed enough.....
Regards,
SUBAL
| Is This Answer Correct ? | 17 Yes | 0 No |
Post New Answer View All Answers
You want to remove a developer's and developer keys from a system. How would you do that?
Any details about secatt apart from SAPSecurity online.com?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Is it possible to change role template? How?
how you can delete multiple roles from qa, dev and production system?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Can you explain protecting public keys?
Explain snc in sap security?
Attributes in SE01?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
how a t code works
Can you explain internet-level security?
How to create users?
what is user buffer?