Security Tables
The names of most Security tables begin with USR, AGR or UST. Here are a few of the most common
Read MoreLearn SAP Security & Authorizations Concepts
The names of most Security tables begin with USR, AGR or UST. Here are a few of the most common
Read MoreSAP delivers ECC 6.0 with more than 3000 authorization objects. Remembering even a tiny fraction of the total number is
Read MoreOften a security administrator comes across requirements where the existing authorization objects delivered by SAP is not enough. Mostly these
Read More“Organizational Levels” (Org Levels) as opposed to authorization fields is another of the core concepts that we come across while
Read MoreAs we have already seen in one of the earlier articles, individual user master records can be created/updated through the
Read MoreNew t-codes can be created through the transaction SE93. In the example below, the t-code is created to call a
Read MoreThe Data Browser (transaction SE16) allows us to display (or maintain) transparent tables from the ABAP Data Dictionary. Its an
Read MoreLike the Data Browser (SE16) reviewed in the last article, Quickviewer (transaction SQVI) is very useful tool for quick and
Read MoreThe User Information System (transaction SUIM) is a set of reports on user-authorization data which allows security administrators to query
Read MoreThe Security Trace Tool (transaction ST01) provides a way to trace the complete sequence of security checks for transaction. Since
Read More