Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM

Answer Posted / abcsecurity

We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.

Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure

Is This Answer Correct ?    4 Yes 9 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2204


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7245


What are su25 t-codes used for?

1287


what is the use of defaults tab in start menu

1947


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1100


What does user compare do?

1254


What is sap cryptographic library?

1117


how to do Reporting and Analysis authorizations

2529


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1521


How to do Role Design, Testing and Implementation

2574


What is a composite role?

1546


what things you have to take care before executing run system trace?

1314


Which transaction should not be given to BASIS and DEV team in Production?

2561


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2196


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1550