In SU53 screenshot , there are missing authorization. How
you come to know that these are the relevant Roles in which
we have to add these objects? Decision not SUIM
Answer Posted / abcsecurity
We need to study the documentation of said object and its
object class and include it in a role that contains related
functions. This should be done consulting the key users
related to that module.
Having said this, it should be properly check beforehand
that indeed the missing authorization is the real reason for
an authorization failure
Is This Answer Correct ? | 4 Yes | 9 No |
Post New Answer View All Answers
Explain protecting public keys?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
what is use of copy data in derived role and when we use this one ???
What happens to change documents when they are transported to the production system?
what is the use of defaults tab in start menu
how a t code works
how you can delete multiple roles from qa, dev and production system?
What is the main purpose of parameters, groups & personalization tabs?
Explain transport system-level security?
what is user base in sap security?
How to codify for an Item in SAP? How many digits are required for an item?
Differentiate between usobx_c and usobt_c
what are all the questions covered in "profiles related concepts " please let me know ?
How can I do a mass delete of the roles without deleting the new roles?
What is the difference between c (check) and u (unmaintained)?