one tcode,say sa38, is assigned to 10 diffrent users
through a same role.I want to restrict one of those 10
users to execute only a few reports in sa38 but not all
reports.what are the possible ways of getting it done?
Answer Posted / vikas srivastava
Report can be secure by authorization object S_PROGRAM
S_PROGRAM has two field P_Action and P_Group
P_Action cab have these values:
SUBMIT: Start the program
BTCSUBMIT: Schedule the program to run as a background job
VARIANT: Maintain variants.
P_Group requires authorization group which is attached to
report by this way we can restrict a report to access.
Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
When would you update a sap table directly?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Which transaction code is used to display the user buffer?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Explain document transfer-level security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Support types of WOs you have faced?
How to run the daily background job s for virsa violations ? thabks in advance
Can you explain document transfer-level security?
Pfcg proposed activities but you need only two. What would you do?
Can you explain protecting public keys?
Which t-code can be used to delete old security audit logs?
Can wildcards be used in authorizations?
Any details about secatt apart from SAPSecurity online.com?