11.If the user don't have the access of su53?then how to fine the user missing authorization with out using st01?
Answer Posted / syam prasad mannem
Hi Vamsi
AS a Admin i have the authoriztion to execuite su53 ..
If in case end user doent have the auth to execuite su53 admin have to execute su53 and press F5 and exter the end user name then execuite here he can find the last auth chek
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What does the pfcg_time_dependency clean up?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
What is the difference between role and a profile?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
By which parameter number of entries are controlled in the user buffer?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is the difference between the table buffer and the user buffer?
What is the main purpose of parameters, groups & personalization tabs?
what is user base in sap security?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
List the various user types.
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?