Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

a user is not able to execute a t-code ; hou do u solve
that ? wat are the difft reasons that might be existing ?

Answer Posted / nipun mohendroo

First, the SAP System checks in Table TSTC whether there
exists any such transaction.
If so, it checks whether the transaction is locked or not
(SM01).
Then it checks whether user has an entry of the transaction
being executed in S_TCODE in his/her auth. data.
Then if any further auth. checks are listed for that
particulat transaction, then table TSTCA would be checked
for the same.
after all above checks the user might be able to run a
particular transaction.
User also needs to have the correct field values assigned
in the master record in case the same is listed for the
particular transaction code-auth. object/value matrix.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What does the account assessment category specify in a purchasing document in SAP Materials Management?

1374


Explain internet-level security?

1148


Which tables will you use for making customizing setting for security administration?

1161


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2724


What are the most used tables in sap?

1221


what are the issues you faced with UME?

3065


how we can see FFID if firefighter not able to see FFids ?

2059


What is the use of tmssup* rfc destinations?

2612


Explain sap system transactions?

1179


What is sap cryptographic library?

1076


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1059


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1479


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2191


what is sod in sap security?

1234


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4265