Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


11.If the user don't have the access of su53?then how to fine the user missing authorization with out using st01?

Answer Posted / somesh

If user don't have the access of su53 and sto1 then the user administrator can find the missing authorization.
He execute the tcode su53 after open the screen he click the F5 button then it asks the another user. Now you enter the user name

Is This Answer Correct ?    33 Yes 6 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2408


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1100


What is audit information system?

1175


Differentiate between saml token profile and a sap logon ticket

1430


What authorization is required to create and maintain user master records?

1153


What are the different types of sap security tables?

1153


What is the difference between authorization object and authorization object class?

1177


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2302


what is the different b/w su10 and su12

3028


Explain secure store and forward?

1251


what is the critical issue u are faced in your previous experience

1981


What authorization are required to create and maintain user master records?

1195


What are pfud t-codes used for?

1328


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2498


what is use of copy data in derived role and when we use this one ???

1858