STAUTHTRACE
Maybe I am being cynical here, but I would still say that its very rare that SAP comes up with
Read MoreLearn SAP Security & Authorizations Concepts
Maybe I am being cynical here, but I would still say that its very rare that SAP comes up with
Read MoreSAP NetWeaver ships with a mind bogging array of highly specialized applications to support different business processes. A SAP consultant
Read MoreIts quite common in the SAP world that one transaction calls another via different menu options. At the code level
Read MoreAs all of us know, SAP is an an example of an Enterprise Resource Planning software. However, a lot of
Read MoreThere is already a post in this blog which talks about the SU25 transaction. However while recently working on a
Read MoreTill now we have created users and group in the CMC and mapped these groups to application and content rights.
Read MoreJust like rights for content, Business Objects also allows us to set the rights that users have for specific application
Read MoreBOBJ is a reporting tool and an end user would typically use the BI launchpad to execute reports assigned to
Read MoreEach of the applications in the BOBJ suite which are administered through the CMC exposes different rights on themselves to
Read MoreLike most other SAP applications, BOBJ uses a Role Based Access Control Mechanism. To assign roles or rights to a
Read More