In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?
Answer Posted / gaurav
1> You'll need to check if the transaction that is being
requested is available in the system i.e if it exists or
not. You'll have to check this thru transaction SE93.
[If not then the ABAP team needs to get this transaction
coded into the system]
2> If transaction does exists and if you are not able to
find this in any production/ end user roles, then you'll
have to see if you can find any ViewName/ Table Name linked
to this transaction [this would be on the same screen i.e.
SE93 at the bottom]
3> If a ViewName is available then this means that this new
transaction will be interacting with the table you found
and hence the object S_TABU_DIS and SU24 change will come
into picture.
4> You then need to take a trace yourself in Development
system by executing this transaction and check the trace
report for the activities that show up.
[Note: Remember to undo whatever you have saved]
5> Take appropriate approval for role modification as per
process you follow in your organization.
6> Make SU24/ role changes in development system and have
these changes moved till Quality or Fix system for testing
purpose. Create test ID's accordingly.
7> If testing fails, get SU53 report and redo analysis. If
testing is successful create production/ end user roles,
make a TP request and get your changes moved till
production system.
Is This Answer Correct ? | 7 Yes | 3 No |
Post New Answer View All Answers
How to run the daily background job s for virsa violations ? thabks in advance
What authorization is required to create and maintain user master records?
Explain internet-level security?
Tell me about derived role?
what is the main difference between the derived role and a single role?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
What profile versions?
How we schedule and administering background jobs?
what is user base in sap security?
What are se10 t-codes used for?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Can you explain transport system-level security?
What authorization are required to create and maintain user master records?
Which transaction should not be given to BASIS and DEV team in Production?