I've suggested to moderators to move this to the Security forum since this seems to be not an ABAP question. The original post is a bit confusing though because having authorization and actually using it are two different things. You might want to clarify what you're looking for exactly and for what reason.
↧