Re: Authorization debugging
Hi CTRL-F only works for the set of code you are in at the time. Debugger lets you identify all (well most of) the checks that are performed for an actual execution, regardless of the programs, FM's...
View ArticleRe: Authorization debugging
Hi Alex, ok, but my doubt is , will Debugging for Breakpoint statement eg. Breakpoint at statement AUTHORITY-CHECK, show/does anything else except finding out the AUTHORITY-CHECK statements, in the...
View ArticleRe: Authorization debugging
Hi, one big benefit is that the debugger will show you what values are being passed into the check (so it will show object + activity/plant etc). Using the debugger certainly isn't a replacement for...
View ArticleRe: How to set automatic user password reset policy ?
Hi Lokesh, Please suggest to users they can reset password during SAP login by clicking on New Password button. Thanks
View ArticleRe: SNC without third party product and SSO
Hello, thanks for the docu.No I have a new problem.Is there a way to establish a secure connection with a SAP system without an Active Directory (Kerberos) ? Best regardsA. Moore
View ArticleRe: How to set automatic user password reset policy ?
Lokesh, There is no inbuilt automatic password reset functionality available until users knew their existing password which can be reset in login screen as Ranjeet mentioned.You can do it in two ways:...
View ArticleRe: SUIM - Change Documents
Hi,each report has a t-code. You probably have not assigned sufficient s_tcode authorizations to that user. ST01/stauthtrace help to analyze which auths are missing in fact.b.rgds, Bernhard
View ArticleRe: SUIM - Change Documents
I am sorry its in danish, but i hope you get the point. The green arrow can user access, but the red he can´t access. I this a help?
View ArticleRe: Change Document for Authorization - Authorization Missing
Hi,you probabyl hit the limit of values desribed in SAP note 410993 ->3.. So when gererating the profile, 'sub'-authroizations are created automatically ->see last paragraph in that note. You...
View ArticleRe: SUIM - Change Documents
Michael, Like Bernhard said u need to do a system trace to identify missing authorization Authorization checkGo to ST01 and check "Authorization Check" Turn on "Trace On" and ask the user to navigate...
View ArticleRe: Change Document for Authorization - Authorization Missing
Hi Bernhard, I see. I didn't know that the S_TCODE field can automatically divide the authorizations with just one field. So that's why I couldn't see the sub-authorization for it.Thank you for your...
View ArticleRe: Change Document for Authorization - Authorization Missing
Hi Andreas, The User WCS-021 created a new node 41001 which it means that the user added the another S_TCODE object in addition to the previous one whose log is 41000 and delete the old one 41000. That...
View ArticleRe: Change Document for Authorization - Authorization Missing
Hi Ramesh, Yes, I know that if we added an object that is already exist, a new authorization (the node in your statement) will be created under that object.The problem is, as you can see, the node...
View ArticleRe: SNC without third party product and SSO
Hello, is there an other way to establish a secure connection to the SAP system over SNC ?Or maybe an other way than SNC ? Best regradsA. Moore
View ArticleRe: SUIM - Change Documents
Hi, Have your user tried to proceed with /nsu53 just after he received the error? Receive error message then type that as he usually does with t-codes. And t-code missing is RSSCD100_PFCG. Regards
View ArticleRe: SUIM - Change Documents
My user have not tried it yet, she a little bit hard to get hold on :-) But when i get hold of her i will let you know.
View ArticleRe: SUIM - Change Documents
Hi, OK, then she will need to open all the nodes and to send you the screenshot with red and green lines, red are missing. As I know su53 catches the first missing, if there's five missing, user needs...
View ArticleEncrypting connecion to SAP GUI in MacOS environment
Dear all, I found a SAP Note 1643878 - Release Notes for SNC Client Encryption which describes SNC Client Encryption for "client/server systems integrated with SAP" scenarios such as connection from...
View ArticleRe: SNC without third party product and SSO
third party products for SNC or something on network levelI can't recommend anything special
View ArticleRe: SNC without third party product and SSO
SNC is the only way. If you use the free SAP SNC library then you need Active Directory since AD is used to issue encryption keys to client and server during the logon. If you don't want to use AD and...
View Article