Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

one tcode,say sa38, is assigned to 10 diffrent users
through a same role.I want to restrict one of those 10
users to execute only a few reports in sa38 but not all
reports.what are the possible ways of getting it done?

Answer Posted / vikas srivastava

Report can be secure by authorization object S_PROGRAM
S_PROGRAM has two field P_Action and P_Group
P_Action cab have these values:
SUBMIT: Start the program
BTCSUBMIT: Schedule the program to run as a background job
VARIANT: Maintain variants.

P_Group requires authorization group which is attached to
report by this way we can restrict a report to access.

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2526


What happens to change documents when they are transported to the production system?

1764


Which tables will you use for making customizing setting for security administration?

1106


How do we test security systems.

1044


Authorization check on s_btch_job failed. What would happen now?

1163


You want to remove a developer's and developer keys from a system. How would you do that?

1046


What are the uses of an authorization group?

1133


What is sap cryptographic library?

1020


Support types of WOs you have faced?

2246


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2393


You want to create and maintain user master record. What authorization would you need?

1132


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1318


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2761


when performing client copies what steps you need to take from CUA point of view?

2510


How to find out who has deleted users in the system?

1102