SU53 – Display Auth Data
Troubleshooting security issues is one of the daily tasks of any security administrator. The first method of investigating authorization failures
Read MoreLearn SAP Security & Authorizations Concepts
Troubleshooting security issues is one of the daily tasks of any security administrator. The first method of investigating authorization failures
Read MoreIn our article on SU24, we saw the feasibility of selectively switching off checks for certain authorization objects. However, HR
Read MoreThis post talks about the program level mechanism to implement a check for a particular authorization object. SAP Business applications
Read MoreThe SU24 transaction is one of the most important transactions in security. Its used to maintain all the objects that
Read MoreA valid user master record must exist for all users accessing the SAP system. The user master is accessed through
Read MoreAccess to SAP system are assigned to users through roles maintained in their user master. In this article, we explore
Read MoreThe introductory article gave a glimpse of one of the thousands of SAP applications delivered as part of a SAP
Read MoreThis site basically deals with SAP security. But before we get into the details of security it would be probably
Read More