one tcode,say sa38, is assigned to 10 diffrent users
through a same role.I want to restrict one of those 10
users to execute only a few reports in sa38 but not all
reports.what are the possible ways of getting it done?

Answer Posted / rax

Hi all,

Generally all roles (containing t-codes) are planned and
created depending on an individuals position (ex- sales mgr)
during implementation. So, the above situation never arises.

According to me this question is just to know the
interviewee's knowledge....

For this particular scenario the answer would be ....
The end user to access reports or programs he needs to have
access to authorization object S_PROGRAM. So,we first
manually add this authorization object to his existing role.
This object has an authorization field called AUTHORIZATION
GROUP in which we can maintain all programs or reports he
has to be given access to....

Is This Answer Correct ?    3 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What authorization is required to create and maintain user master records?

761


what is use of copy data in derived role and when we use this one ???

1422


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

748


How to insert missing authorization?

759


what is the use of defaults tab in start menu

1471






What are st01 t-codes used for?

813


How to run the daily background job s for virsa violations ? thabks in advance

3299


how a t code works

2062


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3341


What profile versions?

890


what is authorization object and authorization object class?

860


Can you explain protecting public keys?

706


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1971


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1843


Can you explain transport system-level security?

709