Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In an environment of derived roles ; a user is asking for a
t-code ; which is not found in suim in search of roles ?
what will u do ?

Answer Posted / sandy

first of all check with role owner whether the user has
permission for that t_code. If no role is found with that
t_code create a new role with that t_code and assigned to
that user after permission from role owner.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which t-code can be used to delete old security audit logs?

1486


Why is it important to delete sap-new profile? What steps will you take to do this?

1135


What are se10 t-codes used for?

1136


User is not there in User master record. Then how to trace the user?

1470


What are su25 t-codes used for?

1249


What is stad?

1172


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3559


how to do Reporting and Analysis authorizations

2464


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3196


How to insert missing authorization?

1143


Tell me about derived role?

1075


Which transaction should not be given to BASIS and DEV team in Production?

2513


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133


what is the critical issue u are faced in your previous experience

1939


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1686