i haven taken training on sap basis... right now i m looking
for job .what we are doing in trace (st01)explain in detailed.
Answer Posted / prakash
Hi,
I partially agree with Subal, need to follow below 2 points
before performing all the steps mentioned above by Subal.
- First we need to check in which application server user
has logged in.
- Using SM51 tcode, you need to login same application
server where user logs in.
- Then perform trace activity
| Is This Answer Correct ? | 10 Yes | 0 No |
Post New Answer View All Answers
what is user base in sap security?
what is use of copy data in derived role and when we use this one ???
How to codify for an Item in SAP? How many digits are required for an item?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What does the account assessment category specify in a purchasing document in SAP Materials Management?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
how we can see FFID if firefighter not able to see FFids ?
How do we test security systems.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What authorization are required to create and maintain user master records?
Differentiate between temp role and copy role
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
what is the critical issue u are faced in your previous experience
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?