one tcode,say sa38, is assigned to 10 diffrent users
through a same role.I want to restrict one of those 10
users to execute only a few reports in sa38 but not all
reports.what are the possible ways of getting it done?

Answer Posted / vikas srivastava

Report can be secure by authorization object S_PROGRAM
S_PROGRAM has two field P_Action and P_Group
P_Action cab have these values:
SUBMIT: Start the program
BTCSUBMIT: Schedule the program to run as a background job
VARIANT: Maintain variants.

P_Group requires authorization group which is attached to
report by this way we can restrict a report to access.

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

When would you update a sap table directly?

887


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2436


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2247


Which transaction code is used to display the user buffer?

951


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2506


Explain document transfer-level security?

913


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2370


Support types of WOs you have faced?

2049


How to run the daily background job s for virsa violations ? thabks in advance

3458


Can you explain document transfer-level security?

922


Pfcg proposed activities but you need only two. What would you do?

929


Can you explain protecting public keys?

860


Which t-code can be used to delete old security audit logs?

1228


Can wildcards be used in authorizations?

971


Any details about secatt apart from SAPSecurity online.com?

2127