Re: T-code authorization
Hi, one program may have multiple transactions codes assigned to it. For example you can create multiple variants and assign these variants to different users. When you execute a program directly,...
View ArticleRe: T-code authorization
Hi Martin, Correct me if i'm wrong. What you saying is different T-codes are used to run the same program is a different manner based on the assigned variants, Even though there is no authorization to...
View ArticleRe: T-code authorization
azonic evolution wrote: However, running the program directly through SE38, will have no protection (authorization) on how is it being executed? if by protection you mean check for authorization...
View ArticleRe: T-code authorization
Thanks sir! Deeply appreciate your kind explanation! However do you mean in SE93 instead of SE91?
View ArticleRe: Saving Layout: how to remove grayed-out "user-specific" option?
Hello Bernhard, Please see sample trace which we have performed for a user that has theoption grayed-out.Would you be able to help me find which of these are relevant? Thanks and regards!Zeke
View ArticleRe: Saving Layout: how to remove grayed-out "user-specific" option?
Hi Ravi, yes i believe you and Bernhard are correct, but when we tried to check if S_ALV_LAYO is existing in one of the users who have no issues, we found none.Please help. Thanks and regards!Zeke
View ArticleIssues in USMM user classification tab
As part of system measurement , First We have updated the license type of the 6000 dialog users that are active in SAP using SU10 (Classification based on the assigned roles).After that when we ran the...
View ArticleRe: Saving Layout: how to remove grayed-out "user-specific" option?
Hello Zeke, in the trace you see the RC=12 for the object S_ALV_LAYO with ACTVT 23. So please check if the user have this object in one of his assigned and valid roles.Check the user buffer of the...
View ArticleRe: How safe is S_PROGRAM?
I know this is a bit out of date, but did you consider a user running LSMW that executes one of your programs while using another user's ID?
View ArticleRe: How safe is S_PROGRAM?
Still here, still here... I think you need authorization S_BTCH_NAM in order to schedule background jobs (like a BI session running in background) under a different user name than your own, so that's...
View ArticleRe: Display access to SE38, SE37 & SE80 in production
Jeanne:execute capability is only allowed if the user has S_DEVELOP with activity 16 and the name of the program or function module being executed. Is there still a risk in giving these and if so,...
View ArticleRe: Display access to SE38, SE37 & SE80 in production
You cannot. P_GROUP in S_DEVELOP is not used and P_GROUP of S_PROGRAM is not scalable. Perhaps Jeanne can clarify, but she states that display was critical when there was no '16' and wants to know if...
View ArticleRestrict users to not view other users spool requests
I have been tasked with cleaning up the ability for other users to view others spool requests. My understanding is that there was an EWR on this. Frankly, I just do not have an understanding of this. I...
View ArticleRe: Display access to SE38, SE37 & SE80 in production
I have no intention of granting activity 16. I am only questioning if there are unknown risks with just activity 03. We have an extensive procedure to follow for getting SE38, SA38, or SE37 in...
View ArticleRoles to be removed from multiple users in BI
How can we delete all roles for nearly 700 users when I do it with SU10 it is not working, it gives "NO changes made to user XXXX" I checked remove and Change box
View ArticleRe: Roles to be removed from multiple users in BI
You need to match validity dates from table agr_users. If removing same role from all then paste your use in su10 and go to change/roles/remove. Copy the role, valid from and to dates from the table....
View ArticleRe: Display access to SE38, SE37 & SE80 in production
For developers who only have '03' and the new '16' checks are implemented, it is quite acceptable to have an uncomplicated process for the access (on an adhoc basis if you have a user friendly way of...
View ArticleRe: Roles to be removed from multiple users in BI
This option does not exist in the standard as the role names will differ in 700 different combinations. However there are BAPIs for the user admin, so it is quite safe to model it and loop through the...
View ArticleRe: Restricting PT60 Schema transaction using Payroll Area.
Hi Priyanka, You may also customize PT60 to add new selection fields, although it's not the best solution and perhaps not recommended by SAP. RegardsAnkit
View ArticleHow to audit the in-use encryption algorithm of commoncryptolib?
I am trying to determine which encryption algorithm is in use during saprouter to saprouter SNC connections. In a lab environment, I have implemented saprouter to saprouter with SNC using some locally...
View Article