Re: Places where an userID is used
agree it's best not to delete userids, but if you must.. remember to also check for open workflow tasks and sap office documents tied to the user.
View ArticleRe: Places where an userID is used
And also job steps running under that user ID... Some users immortalize themselves in the system instead of using system users with dedicated roles for the set of job steps. Cleaning such a mess up can...
View ArticleIdentification of Non Transactional Users from Roles
Hi All, Currently we have 21K+ Employees in Organization.. Roles are assigned as Default ESS and TransactionalNow we have got a requirement to identify only Non Transactional Users from Roles which is...
View ArticleRe: Identification of Non Transactional Users from Roles
I assume that you need to pull the list of users who do not have transactional access (only ESS access) If my assumption is right , 1) AGR_USERS , give the input of ESS role in Role field and get the...
View ArticleRe: RHPROFL0 not removing PD profiles
Hi, Very delayed reply, but still this may help others. Yes it will not be removed, unless you assign a dummy position/person which is not assigned with any PD profile and run the report RHPROFL0 for...
View ArticleRe: Creating Sub-CAs in SSO Server with additional key usages
Hello Tapan, Yes, I can elaborate.In the SSO Server Certificate Store, there are 4 standard CA typesRoot CA User CA - Sub CASSL CA - Sub CASAP CA - Sub CA They have their own key Usage properties...
View ArticleRe: Purchasing users only allow to maintain costing data engring team only...
Hi Krishna, They are using custom tcode and updating these tables. ThanksSaravana
View ArticleRe: Purchasing users only allow to maintain costing data engring team only...
Check with your ABAP team about the screen/transaction variant and try to make two different views for same tcode. Tcode with Screen variant 1 - allow to update costing data only Tcode with Screen...
View ArticleRe: Purchasing users only allow to maintain costing data engring team only...
Thanks Krishana.. Its answered what we expected.
View ArticleRe: Purchasing users only allow to maintain costing data engring team only...
Great ! you're welcome. Please mark this thread 'answered'. Thanks,krishna
View ArticleCompare: Portal execute html or back end execute html
Dear experts, I have some quetions abaut what are the best practices for security and performance reasons in developing of web services. Imagine a customer that acces to SAP Portal to execute some...
View ArticleBranchs controls by user
Hello, I'm from Argentina and we have this issue in our system: we need to separate users by Branch, so someone from Branch 1 (assigned by role) only can register documents for that same branch with...
View ArticleNew Setup Authorization
Dear All, Good day to you. I like to know why i encountered error message " You have no authorization for this transaction in Plant XXXX)" after execution of T-code: MB52.I ran SU53 to check the...
View ArticleRe: New Setup Authorization
If yes, please explain the reason?Yes - ADM940 training explains the SAP authorisations concept to youFor a visual understanding, go to SU56 and look at the user buffer to see how the...
View ArticleRe: Branchs controls by user
Did you trace(ST01/STAUTHTRACE) the below actions and determine those authorization objects are being checked? - registering documents for that same branch with transaction FB60- execute documents...
View ArticleRe: spro full authorization without sap_all and sap_new
Hi Just wanted to clarify. We are auditors and will always be requiring SPRO full display access as we will be covering almost all business cycles including system admin (Basis) during an year. We do...
View ArticleSecure access to a project in PS
Hi all, is it possible to limit the access to a project in SAP PS by assigning authorizations only for a certain project number? The project builder CJ20N uses project definitions but not project...
View ArticleRe: New Setup Authorization
Esther In which of the 2 roles are you maintaining M_MATE_WRK? Sri
View ArticleRe: Can we find the auth method used after a user has authenticated ?
Hi Tim, I'm sure you meanwhile found the answer - but maybe this helps other users finding your posting to solve their problem (as I also spent some time to get the information) I found a kernel...
View Article