Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Differentiate between derived role and composite role
Differentiate between saml token profile and a sap logon ticket
what things you have to take care before executing run system trace?
What is Sap security t-codes?
What are st01 t-codes used for?
what is your ticketing tool? can we give some details about how we are getting tickets
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Explain document transfer-level security?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
how you can delete multiple roles from qa, dev and production system?