Q5)
What is the procedure you follow in your company as a
security admin when a end user complains that he is unable
to perform or execute an action in a particular tcode?
Answer Posted / anand
the user sends su53 report for mising authorization, then
using suim-->roles-->roles by selection criteria-->give user
id and the authorization object found in su53 report. this
finds out that the user has role or not, if the user has got
it then its not properly configured if the user hasn't got
the role he is not supposed to do the task. In either case
check with your Application manger get the approval and
assign it. hope it helps you.
| Is This Answer Correct ? | 18 Yes | 0 No |
Post New Answer View All Answers
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Which t-code can be used to delete old security audit logs?
Can you explain internet-level security?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Attributes in SE01?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is stad?
User is not there in User master record. Then how to trace the user?
what is the difference between usobt_c and usobx_c?
Which transaction should not be given to BASIS and DEV team in Production?
How do we test security systems.
Differentiate between derived role and composite role
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?