In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?
Answer Posted / subal
1.check if the tcode exists or not.
2.try to search the role with S_tcode and then putting the
tcode in "roles by complex selection criteria"
3.you should at least get SAP standard role which should
not be assigned.
----------------------------
So after doing all these you are not able to find any end
user role available in system.
Nxt step is the proposal of adding the tcode to a suitable
role.
as it's a derived role envi---> need to add the tcode in
template / parent role
take approval from BPR/role owner for role modification.
they will decide which parent role to change.
change role [by adding the tcode]in Dev and transport to
rest of the sys in landscape
| Is This Answer Correct ? | 6 Yes | 1 No |
Post New Answer View All Answers
What is Sap security t-codes?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Explain protecting public keys?
How to codify for an Item in SAP? How many digits are required for an item?
How we schedule and administering background jobs?
what are all the questions covered in "profiles related concepts " please let me know ?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
What does the profile generator do?
What is sap internet transaction server?
what is authorization object and authorization object class?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects