Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

a user is not able to execute a t-code ; hou do u solve
that ? wat are the difft reasons that might be existing ?

Answer Posted / nipun mohendroo

First, the SAP System checks in Table TSTC whether there
exists any such transaction.
If so, it checks whether the transaction is locked or not
(SM01).
Then it checks whether user has an entry of the transaction
being executed in S_TCODE in his/her auth. data.
Then if any further auth. checks are listed for that
particulat transaction, then table TSTCA would be checked
for the same.
after all above checks the user might be able to run a
particular transaction.
User also needs to have the correct field values assigned
in the master record in case the same is listed for the
particular transaction code-auth. object/value matrix.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How can I do a mass delete of the roles without deleting the new roles?

1524


Explain secure store and forward?

1250


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2235


When would you update a sap table directly?

1124


what is sod in sap security?

1289


How can sap security be improved?

1175


how we do CUA configuration in Quality system

2484


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1358


User is not there in User master record. Then how to trace the user?

1512


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2360


How we Educated client personnel in R/3 Security and general Basis knowledge

2331


Explain network topology in sap systems?

1153


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2498


What are su25 t-codes used for?

1287


how you can delete multiple roles from qa, dev and production system?

1340