Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Tell me about derived role?
What does the item category specify in a purchasing order in SAP Materials Management?
Explain snc in sap security?
How to update risk id in rule set?
What are se09 t-codes used for?
How we Educated client personnel in R/3 Security and general Basis knowledge
What profile versions?
What happens to change documents when they are transported to the production system?
what is the process to find that one consultant had removed a table from sap tables
what is hypercare and go live support?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
how a t code works
As a SAP security consultant what is the most challenged you faced in previous company?
When would you update a sap table directly? What precautions would you taje?
What is Sap security t-codes?