Some User has made changes to Tables in SAP. How to identify that user?
Answer Posted / sapsecvj
A little BG: If I create a role using PFCG, there are at least 2-3 tables been updated, eg: AGR_TEXTS, AGR_125 even though I do not have S_TABU_DIS & S_TABU_NAM.
Majority of the business transactions will be updating the tables in the back-end. We need to know on which date, which Tcode is used and which table is been updated by the user.
Method 1:
Go to ST03N and trace out who used the Tcode on the particular date.
Method 2:
Use FM CHANGE_DOCUMENTS_READ (dont have access to SAP, pls check name). Pass appropriate Values to the FM. it will return results from CDHDR, CDPOS tables. this is also the fastest way to access them.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
How can I do a mass delete of the roles without deleting the new roles?
Differentiate between derived role and composite role
What are some ap security t codes?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
What authorization is required to create and maintain user master records?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Can you explain snc in sap security?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is the maximum number of profiles in a role and maximum number of object in a role?
What profile versions?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
How we schedule and administering background jobs?
how to do Reporting and Analysis authorizations
Can wildcards be used in authorizations?