Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
what are the issues you faced with UME?
What is the difference between c (check) and u (unmaintained)?
You want to create and maintain user master record. What authorization would you need?
What are se10 t-codes used for?
Differentiate between temp role and copy role
Can you explain sap system transactions?
what is hypercare and go live support?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Explain x-glueb and its use in sap security.
What is a composite role?
What is use of derived roles?
What is the difference between usobx_c and usobt_c?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
what is centralize FFID?
Pfcg proposed activities but you need only two. What would you do?