Q4)
What are the limitations of ST01? Explain in detail?
Answer Posted / sujithkvra
While we performing trace session all the authorizations of that user will be recorded(both existing and missing).
That missing authorizations include both requested and not requested authorization by user,the user(from functional module) will not be aware of the required Authorization Object.
here we(the Security Administrator) has to manually identify the correct Authorization the user required.
Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
What does the account assessment category specify in a purchasing document in SAP Materials Management?
what is user buffer?
How can sap security be improved?
What is the difference between c (check) and u (unmaintained)?
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
As a SAP security consultant what is the most challenged you faced in previous company?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
what are all the questions covered in "profiles related concepts " please let me know ?
What is the use of tmssup* rfc destinations?
what is user base in sap security?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
How to codify for an Item in SAP? How many digits are required for an item?
Authorization check on s_btch_job failed. What would happen now?
What is stad?