Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
what is user buffer?
Differentiate between temp role and copy role
User is not there in User master record. Then how to trace the user?
You want to create and maintain user master record. What authorization would you need?
When would you update a sap table directly? What precautions would you taje?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What is the maximum number of profiles in a role and maximum number of object in a role?
what is your ticketing tool? can we give some details about how we are getting tickets
How do we test security systems.
what is the different b/w su10 and su12
How do you check background jobs?
Differentiate between derived role and composite role
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is the difference between the table buffer and the user buffer?
What is use of derived roles?