Any way to list users' roles and teams in the advanced fine list?

Hello,
Is there any way to list user's Roles and Teams in the advanced find list?
In general, I am looking for a technique to list the related entities of the main entity in the advanced find.
Thank you,

Unfortunately not. Advanced Find can only display records of one type - i.e. you can't show an entity, along with its related entities.
Also, the underlying entities that store the team membership and role membership are not available for output in Advanced Find.
Instead, you could create a report to display this data
Microsoft CRM MVP - http://mscrmuk.blogspot.com/ http://www.excitation.co.uk

Similar Messages

  • Is there any way to recover your contacts and notes in the event you inadvertently delete them?

    I inadvertently deleted my contacts and notes from my iphone 3G in an attempt to synch to Microsoft Outlook Calendar and E-mail accounts.

    Have a look at this...
    http://support.apple.com/kb/ht1414
    Look at the bottom for instructions on restoring from a previous back up

  • Is there any way to create admin role only for one resource.

    Hi all,
    I am trying to create an admin role with 'update user' capability. But I want to restrict the user(with the admin role) to be able to update a user's attribute only for one resource, The user(with the admin role) should not be able to update the attributes of the other resources which a user have.
    Is there any way to create admin role only for one resource?
    I customized the tabbed user form to show only one resource attribute (deleting the missing fields and adding my tab for the resource) and then assigned this new User Form to the user(with the admin role) in security tab.
    It works fine. But the problem is that if any user(with the admin role) is also admin of some other resource then he/she will not be able to view the other resource attributes.
    Please suggest,
    thanks

    The loop function always repeats the same region so of course the fade is also copied. So option+drag the original region to make a (non clone) copy, fade the first region and loop the second one (which you just copied).

  • Is their any way to restrict user from overriding  the graphs in SAP APO?

    Dear All,
    As we know, we can copy the graphs to other users using /n/sapapo/sdp_graph. But is their any way to restrict user from overriding the graph to particular user.
    Scenarios:
    In a project we have super user and semi-super user, whenever super user uses above t-code to copy graph to all users (he has included semi-super user id to target user list) but semi-super user does not want to override his graph by super user.
    Do we have such function in APO to restrict?
    Hope it is clear to understand.
    Regards,
    Pravin Tikar

    Hi Amol,
    thanks,
    I have checked SP Note 400434 - Authorizations in APO demand planning Also.
    Will check the authorization and will update the same.
    regards,
    Pravin Tikar

  • Is there any way to force a Role Check for authorization from a Ztable

    Hi all,
    I have an issue that deals with Authorization check using a role. I have to know if there is any way to make a Role force to check if an entry exists in a Ztable.
    Eg. A User is assigned a role Z:Ztable_check. Can we now force this Role to somehow check for a particular entry in a Ztable which has a Username and its Corresponding Authorized Cost center. Can the role check from the Ztable and allow the user to view only those cost centers that he is allowed to.
    Don't know if this is even theoretically possible.

    hi
    see if this helps you
    <b>The SAP Authorization Concept
    Authorization checks are a means of protecting functions or objects in the R/3 System. The programmer of the function determines where and how these checks are made, while the user administrator determines (within the framework defined by the programmer) who can execute a function or access an object.
    The terms central to the SAP authorization concept are:
    Authorization field
    This is the smallest unit against which checks can be made. The programmer can create authorization fields by selecting Tools &#8594; ABAP Workbench &#8594; Development &#8594; Other tools &#8594; Authorization objs &#8594; Fields.
    Example: ACTVT and CUSTTYPE.
    Authorization object
    An authorization object groups together 1 to 10 authorization fields which can then be checked as a combination. The programmer can create authorization fields by selecting Tools &#8594; ABAP Workbench &#8594; Development &#8594; Other tools &#8594; Authorization objs &#8594; Objects.
    Example: The authorization objekt S_TRVL_BKS groups together the authorization fields ACTVT and CUSTTYPE.
    Authorization
    An authorization is a combination of permitted values for each authorization field of an authorization object. The user administrator creates authorizations by selecting Tools &#8594; Administration &#8594; Maintain users &#8594; Authorization.
    Example:
    S_TRVL_CUS1 is an authorization for the authorization object S_TRVL_BKS with the values
    for customer type (CUSTTYPE) and
    02 for activity (ACTVT).
    Users who have this authorization are allowed to change the bookings of all customers.
    S_TRVL_CUS2 is an authorization for the authorization object S_TRVL_BKS with the values
    B for customer type (CUSTTYPE) and
    03 for activity (ACTVT).
    Users who have this authorization are allowed to display the postings of all customers.
    Authorization profile
    An authorization profile represents a simple workplace in the context of authorizations. An authorization profile contains authorizations for the authorization objects a user needs to operate effectively in a restricted task area. The user administrator creates authorizations by selecting Tools &#8594; Administration &#8594; Maintain users &#8594; Profiles.
    User master record
    Your user master record is checked when you logon to the R/3 system. Through the authorization profiles, this provides restricted access to the functions and objects of the R/3 System. The user administrator creates authorizations by selecting Tools &#8594; Administration &#8594; Maintain users &#8594; Users.
    Authorization check
    The programmer can perform authorization checks with the ABAP command AUTHORITY-CHECK by specifying the value to be checked for each authorization field defined. The system then scans the profiles in the user master record for the authorizations specified. If one of the authorizations found for all fields of the authorization object covers the values specified by AUTHORITY-CHECK, the check was successful.
    Example: Check whether the user is allowed to change the postings of business customers:
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
                    ID 'ACTVT'    FIELD '02'
                    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
      MESSAGE E...
    ENDIF.
    If the authorization S_TRVL_CUS1 exists in the user's master record, the authorization check is successful. However, if the authorization S_TRVL_CUS2 exists, but not the authorization S_TRVL_CUS1, the check fails.
    Authorization assignment
    The system administrator is responsible for assigning user master records with the correct authorizations. You should use the Profile Generator to maintain authorization profiles. However, you can also change them manually. Each authorization object contains authorizations. These are grouped together in authorization profiles such that each authorization profile represents a job description, for example 'flight reservations clerk'. You assign one or more authrization profiles to each user master record. You can assign an authorization to as many authorization profiles as you like, and an authorization profile to as many composite profiles and users as you like. Composite profiles are used in manual authorization maintenance, and form a further division in the authorization structure. However, they are not strictly necessary.
                      User master record
                    Auth. profile  Composite auth. profile
               Authorization              Auth. profile
                 Values              Authorization
                                   Values</b>
    plz reward if satisfied

  • ABAP User Roles and Query for accessing particular T- codes and Reports

    dear Gurus
    I have one problem, i want to know about ABAP User Query ,i have one requirement my user wants to Lock all the HR Std versus Customized reports in T- code SQ01,other department peoples also see the Payslips and Hr personal reports which is harmfull to the dept so i want to Lock all the reports in Std T- code in SQ01 and i have created one Customized User Roles or Query in which the T-codes and Reports are assigned only those particular user can access the T-codes and Std reports .how can it be possible i dont have any idea about user roles and Queries .
    kindly help me out or send me some documents related to user roles and queries
    regards ritesh sharma

    Hi Ritesh,
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/103cafc2-7a64-2b10-14b3-eddb7d324561
    Regards,
    Flavya

  • User role and Authority-check ?

    Hello,
    Could you please let me know how are the differences between User role and Authority-check. In a program I do not use Authority-check , And The user is not assigned to user role which contain this transaction ( for this program), Can the user execute this transaction OR he must be assigned to user role which contain this transaction to execute it . Supposing that we do not use any Authority-check in then program.
    Thanks in advance

    Hello Martin,
    I think this answers the OP's question about user not being assigned the role which contains the trxn code. As you have explained in this case the default auth. check for S_TCODE will fail & user cannot execute the trxv. (If i remember correctly the tables for this are AGR_USERS & AGR_TCODES)
    Anyways just to add to the OP's query. Auth. objects are added to profiles which in turn assigned to roles. So if you implement the auth. object in your program the user must also subscribe to the role containing the auth. obj. profile to be able to execute it.
    @OP:
    The transactions PFCG & SUIM might interest you. Also the tables dealing with these stuffs begin with AGR*. You can check the tables for better understanding.
    BR,
    Suhas

  • List of roles and corresponding transactions and infotypes

    Hi Friends,
    I want to prepare baseline list of roles and corresponding transactions and infotypes that we have access to in Production system. Please let me know easiest way.
    Thanks,
    Ankitha

    In [this thread|Security - HR Authorizations; you'll find a similar question and some suggestions. Once you've got your roles it should be fairly easy to determine which transactions are in them.
    Jurjen

  • Query user roles and access

    hi,
    How can query user roles and access in whole database? I want to list username, status, rights, and role
    thanks
    P

    Hi,
    The data dictionary view dba_users has one row per user.
    The data dictionary view dab_role_privs has one row for every distinct combination of user and role that actually occurs ion your database,
    Are you interested in system privileges? See dba_sys_privs.
    Are you interested in individual grants, like the privilege to UPDATE a given table, or the privilege to execute a given stored procedure? See dba_tab_privs. (Don't be fooled by the name; it's not just for tables.)
    I hope this answers your question.
    If not, post some CREATE statements, that create tables, roles, and whatever else you want, and some GRANT statmeents that grant privileges on those objects. Pos the results that you would want to get from those objects and grants.

  • Is there any way to forse user to put at least 5 characters when using LOV?

    Hi gurus,
    I have a question.
    Is there any way to force user to put at least 5 characters when using LOV?
    I want user to put at least 4 characters before/when using LOV.
    Is there any way to do that?
    Thank you for your answers.
    Nerijus

    Hello,
    i've tested it both on 6i and 10g and also set the lov name at runtime.
    All i can say is, it does what it is supposed to do.
    So you should give it one more try:
    - leave the item properties NULL ( LOV name ) and NO ( Validate_From_List )
    - add following code in the WVI - Trigger
    IF :AUFTRAG_NEU.PN IS NOT NULL AND LENGTH ( :AUFTRAG_NEU.PN ) < 5 THEN
      Show_Message ( 'Bitte 5 Zeichen eingeben' );
      RAISE FORM_TRIGGER_FAILURE;
    ELSIF :AUFTRAG_NEU.PN IS NULL THEN
      NULL;
    ELSE
      SET_ITEM_PROPERTY ( 'AUFTRAG_NEU.PN', LOV_NAME, 'LOV_PN_PROJEKT' );
      SET_ITEM_PROPERTY ( 'AUFTRAG_NEU.PN', VALIDATE_FROM_LIST, PROPERTY_TRUE );
      IF SHOW_LOV THEN
        NULL;
      END IF;
      SET_ITEM_PROPERTY ( 'AUFTRAG_NEU.PN', VALIDATE_FROM_LIST, PROPERTY_FALSE );
      SET_ITEM_PROPERTY ( 'AUFTRAG_NEU.PN', LOV_NAME, '' );By the way, what exactly doesn't work?
    Bernd

  • I updated to maverick, and maybe it's a coincidence but my left shift key doesn't work unless i really press it down.  Is there any way to fix this without bringing it into the Genius Bar?

    i updated to maverick, and maybe it's a coincidence but my left shift key doesn't work unless i really press it down.  Is there any way to fix this without bringing it into the Genius Bar?

    Plugins usually are installed externally to Firefox. However, you can disable them in Firefox so that Firefox does not use them.
    SearchReset is supposed to automate the task of resetting certain preferences, but you still can edit them manually if necessary.
    '''''Address Bar Search'''''
    (1) In a new tab, type or paste '''about:config''' in the address bar and press Enter. Click the button promising to be careful.
    (2) In the filter box, type or paste '''keyword''' and pause while the list is filtered
    (3) Right-click '''keyword.URL''' and choose Reset. This should restore Google as the default for address bar search.
    Does that work?
    '''''Search Box'''''
    Usually it works to choose your preferred search engine from the drop-down. To remove an unwanted search engine plugin, usually the Manage Search Engines... choice at the bottom of the drop-down takes care of it.
    Do either of those work?
    There might be another way to hijack that search box; I think some of the other frequent responders probably are more familiar with it than I am.

  • Is there any way to view full pdf and office documents opened in safari? they just open partically if they are bigs

    is there any way to view full pdf and office documents opened in safari? they just open partically if they are bigs

    Drag them to your iTunes library.  Download the free iBooks app.  Select the PDFs you want too sync in the iTunes books pane.  The iBooks app will show your books collection or your PDFs collection as you select.

  • I've copied my itunes library onto an external hard drive.  Is there any way I can do this and delete songs from my PC without also deleting from the external drive? Already lost two songs!!!

    I've copied my itunes library onto an external hard drive.  Is there any way I can do this and delete songs from my PC without also deleting from the external drive? Already lost two songs!!!  I just want a back up - using a work PC and don't want others accessing my songs.  Hope someone can help.  Thanks!

    I see. To get a better idea of what is being stored where please download and run the script iTunesInfo which should output something like this:
    I'm interested in the block of 4 results starting ITL location. If your profile name shows up somewhere replace it with <Name>.  It is also worth checking under Edit > Preferences > Advanced to see where iTunes thinks your media is supposed to go. My script estimates the setting based on the location of the first media file it can actually find.
    tt2

  • I have installed mountain lion on my early 2009 macbook (not unibody) and it is terrible, it's like owning a windows pc again (almost) What can I do? I paid for mountain lion, is there any way of giving it back and getting a refund?

    I have installed mountain lion on my early 2009 macbook (not unibody) and it is terrible, it's like owning a windows pc again (almost) What can I do? I paid for mountain lion, is there any way of giving it back and getting a refund? obvisoulsy after unintalling it. I couldn't see any reason why it would be bad for my particular macbook, and it downloaded without a problem.

    In what way is it terrible? Mountain Lion is pretty stable. If you are having problems, most likely they are unique to your particular system and can be fixed. If you don't like some of the new features, that does not constitute reason for a refund.
    If that does not suit you, you will have to discuss a refund with Apple, as they are the only ones who can say. Note that the App Store terms do say that all sales are final, so you are not guaranteed a refund, especially since whatever problems you had are not due to defective software.

  • TS2529 I had backed-up my iPhone and when I try to restore it it says that the back-up is corrupt or the iPhone is not compatible. I had a bunch of pictures that I need from that restore. Is there any way to get them back? I did the back-up to my Macbook

    I had backed-up my iPhone and when I try to restore it it says that the back-up is corrupt or the iPhone is not compatible. I had a bunch of pictures that I need from that restore. Is there any way to get them back? I did the back-up to my Macbook

    If the backup is corrupt, there is nothing that can be done.
    For what reason did you choose to not copy the pictures off the device to a computer prior to attemping an update or whatever caused the need to restore?  iPhones are not intended as sole storage of any media.

Maybe you are looking for