a user is asking for a t-code to assign ? hou do u assign
the t-code ?
Answer Posted / kondreddi.raghu
1.First we need to check that Tcode in which role it exists.
2.Check for the roles which user already had.
3.Suppose User belongs A2R related.We need to send a mail to concerned Bussiness approver for suggestion.We need mention everything in that mail like who is the user ,What roles he is having at present in which roles the mentioned tcode exists.
4.Suppose if requested tcode exists in finance related role he may suggest to provide that role access (It's one kind of Scenario) . At the same time he may suggest us to add the tcode in any one of the existing user finance related roles(2nd Scenario) . SOme time he may not agree to give that access to that particular user as his designation doesn't match to use that particular Tcode.
5.Once you got approval to add in any one of his existing roles.Then as usual you will make changes to that role in DEV and create a test user Id and send it to that user for testing. Once testing is successful move the transport to QUA(quality). From there transport will move to PROD by STMS team.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
You want to create and maintain user master record. What authorization would you need?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
When would you update a sap table directly?
What is stad?
User is not there in User master record. Then how to trace the user?
How to find out who has deleted users in the system?
what is the use of defaults tab in start menu
How can sap security be improved?
Authorization check on s_btch_job failed. What would happen now?
how a t code works
What is the maximum number of profiles in a role and maximum number of object in a role?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is the main difference between the derived role and a single role?
What is sap cryptographic library?
Can you explain document transfer-level security?