In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?
Answer Posted / subal
1.check if the tcode exists or not.
2.try to search the role with S_tcode and then putting the
tcode in "roles by complex selection criteria"
3.you should at least get SAP standard role which should
not be assigned.
----------------------------
So after doing all these you are not able to find any end
user role available in system.
Nxt step is the proposal of adding the tcode to a suitable
role.
as it's a derived role envi---> need to add the tcode in
template / parent role
take approval from BPR/role owner for role modification.
they will decide which parent role to change.
change role [by adding the tcode]in Dev and transport to
rest of the sys in landscape
| Is This Answer Correct ? | 6 Yes | 1 No |
Post New Answer View All Answers
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is the difference between role and a profile?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Which transaction should not be given to BASIS and DEV team in Production?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
How to find out who has deleted users in the system?
How can I do a mass delete of the roles without deleting the new roles?
what is the process to find that one consultant had removed a table from sap tables
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
You want to remove a developer's and developer keys from a system. How would you do that?
Can you explain internet-level security?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Can you explain document transfer-level security?
What are pfud t-codes used for?