In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM
Answer Posted / abcsecurity
We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.
Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure
| Is This Answer Correct ? | 4 Yes | 9 No |
Post New Answer View All Answers
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
How to update risk id in rule set?
How to assign any program to user?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
What is the use of tmssup* rfc destinations?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What profile versions?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
List the various user types.
What does the pfcg_time_dependency clean up?
Explain network topology in sap systems?
What authorization are required to create and maintain user master records?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation