Re: AUthorizations needed to change parameters in SU3
same here. nothing in those tables.Termination occurred in the ABAP program "SAPLSPFC" - in "PFL_GET_PARAMETER".The main program was "SAPMSUU0O ". In the source code you have the termination point in...
View ArticleRe: Is the cert code P_ADM_SEC_70 already replaced by code C_AUDSEC_731
Thanks Nick and Julius!
View ArticleRe: SCUL logs in grey and not processing in SAP CUA
Hi Venkat, Since the Idocs are being processed at the child system. It seems the issue is with your reverse RFC set up, as the acknowledgement is not sent to the central system. Test your reverse RFC...
View ArticleRe: Payment Tolerance Groups
Hi JD, The restriction is enforced by the table entry, not authorisations. The authorisations the user requires are the standard ones to perform the relevant postings. Cheers
View ArticleRe: Access to ABAPER On Production
Hi , ABAPers are provided "debug" option in Production , there is no harm in that. As you don't replicate the P to Q on daily basis,so in crictical scenarios they need "Debug" authorizaion. but double...
View ArticleRe: SCUL logs in grey and not processing in SAP CUA
Hello Akshay, The RFC connections from both the child and central systems are working fine. And I checked in WE02 and WE05 where all IDOC's are showing in the status 53. We resolved this issue by...
View ArticleRe: LDAP Connection problem
Hi Vladimir, We are getting same error now. are you able to recollect the resolution for above error. Regards,Shripad
View ArticleRe: Access to ABAPER On Production
Abdul, If you’re asking if it is okay to have access in their everyday support role the answer is NO.If it is a one-time thing as you say to troubleshoot issues that cannot beduplicated in production...
View ArticleRe: Impact of SAP ECC6.0 upgrade from EHP4 to EHP6, Security perspective.
Kshitij, We just just upgraded our sandbox from ECC 6 ehp 4 to 6 and after running su25 over 900 of the proposed auth object checks where changed. There seems to be some issues with the transaction,...
View ArticleBI Authorization - exclude query views from search result in Analyzer
Hi Experts, I have an issue. The problem is that users can see query views in the search result when they are using Find option in Bex Analyzer.I have the menu roles where the S_RS_COMP is included,...
View ArticleRe: Payment Tolerance Groups
<copy&paste_answer_removed_by_moderator> Message was edited by: Julius von dem Bussche
View ArticleAuthorization Trace in BI
Hello, Is there any way in BI where I can run a authorization trace in BI, similar to ST01 in R/3. For example there is a user 'A' who is able to execute a query correctly. When I go in RSECADMIN...
View ArticleRe: Making Key figure Authorization relevant in Analysis Authorization
Hi Dinesh, Thanks.. Just want to recheck on this, for key figure I believe user would not get a authroization error. Key figure values would not be displayed if user is not authorized for it. Query...
View ArticleRe: Authorization Trace in BI
Hi Nitin,I don't fully understand your issue... you can execute Tx. ST01 in a SAP BW system because it's based on Netweaver. You can also use Tx. SU53 to display the authorization error. Could you post...
View ArticleDeleting position to role assignment logs??
Hi Gurus,Recently somehow for some users, their relationship with the position was deleted. (Via PPOMA I think) Is there a way to see who and when it was deleted?Background of issue.Users mentioned...
View ArticleRe: Deleting position to role assignment logs??
Hi, assignment of role can be restricted to limited period. So that could be one explanation. Cheers
View ArticleRe: Deleting position to role assignment logs??
Hi Praveen,Check the Change Documents in CUA (Assuming u r using CUA Setup) or the system in which position is maintained. It shoudl give you a fairly good idea of who deleted it. Incase you are...
View ArticleRe: Access to ABAPER On Production
Abdul, Agree with Wes. Seems ABAPer's believe you are the approving authority and hindering access. Once they know it is out of your hands and they have to follow a formal process of approval, most...
View ArticleRe: Authorization Trace in BI
Hi Nitin, No, it is not the case that a log gets generated only once there is an auth. error on BI. Once you add a user in Authorization log table, the system keeps recording the trace for every query...
View Article