In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?
Answer Posted / gaurav
1> You'll need to check if the transaction that is being
requested is available in the system i.e if it exists or
not. You'll have to check this thru transaction SE93.
[If not then the ABAP team needs to get this transaction
coded into the system]
2> If transaction does exists and if you are not able to
find this in any production/ end user roles, then you'll
have to see if you can find any ViewName/ Table Name linked
to this transaction [this would be on the same screen i.e.
SE93 at the bottom]
3> If a ViewName is available then this means that this new
transaction will be interacting with the table you found
and hence the object S_TABU_DIS and SU24 change will come
into picture.
4> You then need to take a trace yourself in Development
system by executing this transaction and check the trace
report for the activities that show up.
[Note: Remember to undo whatever you have saved]
5> Take appropriate approval for role modification as per
process you follow in your organization.
6> Make SU24/ role changes in development system and have
these changes moved till Quality or Fix system for testing
purpose. Create test ID's accordingly.
7> If testing fails, get SU53 report and redo analysis. If
testing is successful create production/ end user roles,
make a TP request and get your changes moved till
production system.
| Is This Answer Correct ? | 7 Yes | 3 No |
Post New Answer View All Answers
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
As a SAP security consultant what is the most challenged you faced in previous company?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What is sap cryptographic library?
Which transaction should not be given to BASIS and DEV team in Production?
Explain x-glueb and its use in sap security.
What is the difference between role and a profile?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How to assign any program to user?
When would you update a sap table directly? What precautions would you taje?
Attributes in SE01?
Can you explain protecting public keys?
Can you explain secure store and forward?
What is the difference between c (check) and u (unmaintained)?
What does the item category specify in a purchasing requisition in SAP Materials Management?