In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM
Answer Posted / abcsecurity
We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.
Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure
| Is This Answer Correct ? | 4 Yes | 9 No |
Post New Answer View All Answers
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What are su25 t-codes used for?
what is the use of defaults tab in start menu
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What does user compare do?
What is sap cryptographic library?
how to do Reporting and Analysis authorizations
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How to do Role Design, Testing and Implementation
What is a composite role?
what things you have to take care before executing run system trace?
Which transaction should not be given to BASIS and DEV team in Production?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?