Not able to see my own log
Hi, I have controller access and accessing the system through a Firefighter id. However, when I check for Firefighter logs in NWBC, I see all other users who have logged in except my id. Can you please...
View ArticleMass deletion of roles from users
I want to delete all roles from locked users. Is there a specific transaction for this instead of SU10? In SU10 one has to enter the roles to remove.
View ArticleHow to create connection between PFCG role and position in organization model?
Hi Expert, I create one role via t-code PGCG as below and create a position such as 'sales manager' in organization model via t-code PPOMA_CRM. Could you please tell me how to build connection between...
View ArticleSecure storage remote access
Hi, I'm trying to implement a simple java standalone application that will connect to a J2EE instance, get a handle on "ts~sec~securestorage~service" and use it like described in Examples for Using...
View ArticleSecurity Audit Log - Event AUY folder-path\file-name variable too short
Hello Experts, I am trying to fulfill an auditing requirement to log all opening of attachments from GOS in the SAP ABAP system.We are using a combination of RAL and SAL to gather the data we require,...
View ArticleOne employee - two users (end user and superuser)?
Dear Friends, I have a question concerning the management of SAP users with extended permissions. Currently all our employees access the system to fill in the worksheet, manage travel and other...
View ArticleHow to replicate role in Hana from BW without using transaction - RS2HANA_CHECK
Gurus.. I need some clarification. When the DSO's are activated in BW, the role for Hana is created automatically in BW and RS2HANA_CHECK is utilized to generate HANA authorizations from BW. Is there...
View Articlecan't run ABAP program 'RS_ABAP_SOURCE_SCAN'
Hi expert, I ran this ABAP program trying to search a string in all abap codes, but message 'string not found' showed up immediately. then I check SU53, I checked with our security, even granted...
View ArticleNot able to transport analysis authorization after BW upgrade
Hi Experts, We recently upgraded our BI system from 7.1 to 7.4 version.When we try to transport an activated analysis authorization,it's asking for a transport package to save. By default $TEMP package...
View ArticleHow to monitor the transactions executed by user?
Hi All, I would like to monitor the transactions executed and objects / tables that were modified for a user in a period of time. For example the following Query: All The transactions executed for...
View ArticleError while connecting via SSO using SNC parameters of SAP .NET Connector
Our SAP systems at my company are not SSO. But we have recently developed quite a few ASP.NET web applications that use the SAP .NET Connector to read and write data into and out of SAP. We would...
View ArticleNew functionalities in SU25
Hi, We are hitting SAP_BASIS 740 version as effect SU25 has been enhanced with added functionalities. Can I get details for these two options and when it is supposed to be used? Thanks,Krishna
View ArticleUsing BAdI HRBAS00_STRUAUTH to override structural authorization for specific...
Hi all, For a client I'm trying to develop an exception to structural authorizations for specific T-codes.I have figured out that using BAdI HRBAS00_STRUAUTH should be suitable for this.There are two...
View ArticleUser XYZ has no authorization for tp command IMPORT
Dear friends, We have several users who are facing the issue while importing TR in QA system from DEV system. We have checked with the users by assigning them SAP_ALL and even then they are facing same...
View ArticleHow to prevent user from accessing a a specific field in a table?
Hello, From Authorization perspective, there is possibilities to restrict access to tables and group of tables via S_TABU_NAM and S_TABU_DIS.. Is there a way to restrict access to a specific field in a...
View ArticleAuthorization object conflicts in a user profile
We have a requirement where we need to maintain different values of the same authorization object in two different roles for the same user. The requirement is for a user to have ability to display...
View ArticleQuiz: understanding security policies in SAP (SECPOL)
Scenario:Imagine your SAP system (1 application server) is running with the following system profile parameter settings (RZ10): Kernel default values:login/min_password_digits = 0login/min_password_lng...
View ArticleAn User have an error in accessing company codes.
Hi All, I am new the SAP Security, can any one tell me an user who is having access to company codes but also unable to process the reports which he needs to generate it. What are the things I need to...
View ArticleExternal ABAP call to Sharepoint using SAML and OAuth
I'm trying to make a REST call to a SharePoint system based on NTLM using either CL_HTTP_CLIENT or CL_REST_HTTP_CLIENT by authenticating via a SAML token. Does anyone know if this is possible or know...
View ArticleHow to limit a report's output with display only access for few users?
Hi All, We have a custom t-code developed in CRM for executing a report and its output gets displayed in a table. Now there is a business requirement to restrict the authorization for the table fields...
View Article