Answer Posted / madhav1203
This are the 7 steps.
1).define the name of the role.
2).determine the activity of the role.
3).design the menu structure.
4).maintain the authorization.
5).generation the authorization.
6).assign the role to user.
7).perform the user compost
| Is This Answer Correct ? | 21 Yes | 1 No |
Post New Answer View All Answers
What are st01 t-codes used for?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
Explain internet-level security?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
What is the use of Personalization tab in SU01?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
Any details about secatt apart from SAPSecurity online.com?
How to find out who has deleted users in the system?
Can you explain network topology in sap systems?
What are se09 t-codes used for?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
What is the use of tmssup* rfc destinations?