STAUTHTRACE
Maybe I am being cynical here, but I would still say that its very rare that SAP comes up with
Read MoreLearn SAP Security & Authorizations Concepts
Basic Security Concepts
Maybe I am being cynical here, but I would still say that its very rare that SAP comes up with
Read MoreThere is already a post in this blog which talks about the SU25 transaction. However while recently working on a
Read MoreThe concept of parent and derived roles was introduced by SAP to simplify role administration tasks. Its specially helpful while
Read MoreTill now, all our discussion on role administration has been concentrated on creation and maintenance of single roles. A single
Read MoreThe SU25 transaction is needed during the initial installation of SAP and during each subsequent upgrade. Its main utility is
Read MoreDuring installation or an upgrade, SAP delivers a set of default authorization objects which are checked for each t-code which
Read MoreThe SAP Query component in R/3 provides a way of generating simple reports without any actual coding. From this standpoint,
Read MoreThe names of most Security tables begin with USR, AGR or UST. Here are a few of the most common
Read MoreSAP delivers ECC 6.0 with more than 3000 authorization objects. Remembering even a tiny fraction of the total number is
Read MoreOften a security administrator comes across requirements where the existing authorization objects delivered by SAP is not enough. Mostly these
Read More