Answer Posted / prakash
1. Put on the trace
2. Execute the custom transaction code, execute functionality
3. pull out the trace results, list out the authorization
objects has been checked
4. maintain the those auth object in SU24 towards the Tcode
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is a composite role?
What are the uses of an authorization group?
when performing client copies what steps you need to take from CUA point of view?
What are se10 t-codes used for?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
What are su22 t-codes used for?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
You want to create and maintain user master record. What authorization would you need?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
What are se09 t-codes used for?
how we do CUA configuration in Quality system
How we schedule and administering background jobs?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How we Provided Security design, configuration, and support for SAP Enterprise Portals