Answer Posted / karun
After an upgrade you may wonder, which T-codes have been affected by this upgrade in respect of their SU24 values (changed t-codes can be reviewed in table prgn_corr2).
As there is no list provided by SAP, you will have to go through SU25, without knowing how much effort this will take.
To have an impression, of which/how many t-codes are affected, you can get this information in your system directly, after you have started SU25->step 2a.
So after executing 2a, you have already the required information in 2 tables.
First select table PRGN_STAT. Select the line with yor current release (after upgrade) from field PRGN_STAT- RELEASE. In field PRGN_STAT-STEP_NR the value should be 002 (after SU25-2a). This first selection is just to make sure, that 2a has been executed already and the following table content is actual for your current release.
Now enter table TCODE_MOD.
In field TCODE_MOD-RELEASE enter your current release (as per PRGN_STAT- RELEASE). Press 'Number of Entries' to be prepared.....
Remark: if your Upgrade includes more than one release, you need to select all the releases between the current and the start release of course.
Executing the selection returns all affected T-codes.
Depending on the t-codes used in your roles you get a first idea of how many changes you will have to perform in SU25 2c.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What appears as the last sentence in sap note 587410?
What is the main purpose of parameters, groups & personalization tabs?
Explain protecting public keys?
Which t-code can be used to delete old security audit logs?
Authorization check on s_btch_job failed. What would happen now?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Which transaction should not be given to BASIS and DEV team in Production?
What are su56 t-codes used for?
What are su25 t-codes used for?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How can I do a mass delete of the roles without deleting the new roles?
Can you explain transport system-level security?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation