Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
You want to create and maintain user master record. What authorization would you need?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How to run the daily background job s for virsa violations ? thabks in advance
what is hypercare and go live support?
Can you explain document transfer-level security?
Differentiate between derived role and composite role
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What are su53 t-codes used for?
When would you update a sap table directly? What precautions would you taje?
What does user compare do?
What are st01 t-codes used for?