Authority Check within GAF -- redirect to view? How to stop GAF?

Hello,
i'm using GAF with AppC and want to check if user has permission for this GAF.
I didn't find any "standard" for this, i'm checking authority in WD Component, in method "OVERRIDE_EVENT_GAF( )"
How can I stop the GAF and e.g. redirect to a defined WebDynpro view?
Thanks and Regards
Christopher

You can use the FPM event FPM_CLOSE to exit from GAF.
OR
Add the WD view in dialog box and call the dialog box from method open_dialog_box of IF_FPM.

Similar Messages

  • History view changes from any of previous days (e.g. Yesterday, Lasst 7 days) to the "Today" view within a few seconds. How to stop this?

    When I want to review my browsing history, maybe after losing a session, I can't keep the history view at anything but the "Today" view for more than a few seconds.

    Dear [http://support.mozilla.com/en-US/forum/1/681368?#threadId681372 Morbus],
    By "more than a few seconds" I mean even when I do nothing. I'm aware of the behavior you describe and in previous versions there was a work-around for it. You could select the next history entry before the view changes.

  • IPhone WAP web redirection ... how to stop?

    Hi,
    When I browse to various web sites, the sites in question insist on re-directing me to the WAP version of the sites.
    Does anyone know how I can ensure I don't get redirected and I go to the full version of the site.
    Hotmail is a good example of this.
    Cheers
    Rich Carless

    as said before, its not the iPhone doing this, its the website you are going to thats causing this.
    if you can find out what the actual address of the desktop version is and then type that in, it will work.
    for example, MySpace has two different addresses...one for the mobile version and one for the desktop version...neither are actually just www.myspace.com, but if you type in www.myspace.com it will redirect you to either one, depending on the device you are using to get there...so technically the iPhone is still considered a cellphone, so you will get directed to the mobile version, unless you knew the actual address for the desktop version and typed that in instead.

  • How to debug a authority check in program and a authorisation object in tco

    Can anyone tell me how to debug a authority check in program and a authorisation object in tcode
    i just want to know the flow of authorisation object in debugging how user is assocaited with authorisation object and roles.
    i know if sy-subrc ne 0 is authorisation failed ,so please help me anyone on this.
    every time when i put breakpoint ,if its program level only, i am able to decide only through sy-subrc but iam unable o view the flow .

    flow cannot be seen, we have to be based on sy-subrc only...
    you cannot see the flow in read table... describe table... transfer...
    the authorization object will be assigned to the data element, that data element has some realtion to the roles given to the users. So if the role of the user and data element value doesnt match the sy-subrc NE 0.

  • How to use the AUTHORITY-CHECK in ABAP

    I am a security guy but am trying to understand how the AUTHORITY-CHECK works. I have read the help on it but it doesn't answer to my understanding. I want a check in a report so that no matter what the user selects the program goes out and checks the authorization in the users master record and only displays what he has access to. I am sure this is basic but I am not a programmer.
    Thanks

    Hi Greg,
      Basically a AUTHORITY-CHECK is a programmatic way to check a auth object a user has.  This is only as good as the person writing the code makes is.
    Here is a basic example of how it could work.  Lets say you have auth objects for users that limit them to see company code. User A can see cc 10, User B can see cc 20 and user C can see both.
    In the code the programmer would have to first do the authcheck to see what CC the user has access to.  Then they would have to limit his reporting based on the results of the authority check.  So they might do it by saying SELECT * FROM XYZTAB WHERE COMPANY CODE = AUTHCC
    This is what I think you are looking for.  There are other ways to use the auth check.  You can do a check and end the program with a message if they don't have authorization. 
    If you need more info, let me know
    John

  • Authority Check on Value within standard transactions

    Hi Guruus !
    Let's state that a user is allowed and has the profile/role to access a given transaction, let's say MI01, but ME21N will do to !
    Now, actually, users are supposed an that project to be authorized on certain Storage Location (LGORT). How can we set the system so that they can input Storage Location Value they're not authorized on ?
    Is there a standard way to do that ? Or do we have to use some Exit/BAdI in every transactions to check if the input value are correct ?
    I also have the same concern about report transaction, such as ME2K (for example), while executinf (F8) them.
    Thx in advance for your clue,
    N H

    Hi,
    This is a BASIS Issue. Get in touch of your BASIS guy and let him know about anything that you are doing.
    I believe a Standard Authority Object should serve your purpose...Look into the Txn Code SU21 and talk 2 your BASIS Guy.
    Else You can create a Z Authority Object to achieve this Functionality.
    Create an authorization class with SU21 and then create authorization object under it which correspond
    to the your desired tcode. The authorization field is ACTVT. Then go to SE93 and attach the object with the Tocde.
    you have to associate the Authority Object to a role in PFCG.
    Regarding Report Txn, You need to do the same...

  • How to create authority check object and assign to  ztcode which is of modu

    Dear ,
             how to create authority check object and assign to  ztcode which is of custom module pool program.its urgent kindly help points rewarded.

    Manoj,
    You can check with your Basis team to create authorisation object and assigining tcodes to the user profiles.
    K.Kiran.

  • Plz tell me how to create authority check objects and how to usein prg

    dear sir,
    plz tell me how to create authority check objects and how to usein prg

    http://help.sap.com/saphelp_46c/helpdata/en/5c/deaa74d3d411d3970a0000e82de14a/content.htm
    http://help.sap.com/saphelp_nw70/helpdata/en/52/6716a6439b11d1896f0000e8322d00/content.ht
    Create custom authorization – Customer specific object
    If you have requirements that cannot be met using the P_ORGIN and P_ORGXX authorization objects (for example, because you want to build your authorization checks on additional fields of the Organizational Assignment infotype (0001) that are customer-specific), you can include an authorization object in the authorization checks yourself.
    Create the authorization object using transaction SU21. Make sure you keep to the customer name range (Z/Y). To be able to use the new authorization object you have created in the master data authorization check, the object must contain the INFTY, SUBTY, and AUTHC fields. You can use any of the fields of the Organizational Assignment infotype (0001) for the other fields. You can also use customer-specific additional fields provided they are CHAR or NUMC type fields.
    After you have created the object, you must start the RPUACG00 report. This report overwrites the MPPAUTZZ standard include with the code that is needed to evaluate the authorization object you created. Note: Technically speaking, this involves a modification. However, SAP fully supports this procedure. And you should not have more maintenance work as a result of this modification.
              Note: that if you use customer-specific authorization objects, you must maintain these objects in transaction SU24 (Maintain Assignment of Authorization Objects to Transactions) in the same way as you maintain the authorization objects P_ORGIN, P_ORGXX, and P_PERNR
    AUTHORITY CHECK OBJECT Object_name
                ID fieldname1 FIELD fieldvalue1
                ID fieldname2 FIELD fieldvalue2
                ID fieldname3 FIELD fieldvalue3.
                 If sy-subrc eq 0.   "Authorization exists
                 Endif.
    http://articles.techrepublic.com.com/5100-6329_11-5110893.html
    Edited by: JackandJay on Jan 16, 2008 10:21 AM

  • How to make Authority Check for ALVGrid?!

    Hey mates,
    i got the problem which is mentioned in the headline. How can i make an authority check for my ALVGrid? I mean i want to restrict special functions to the matching users ( Display, Edit, Delete mode ).
    Would be cool if someone can help
    Regards Basti

    Hello Bastian
    A simple approach would be to define three different transactions (e.g. Z_MYALV01, Z_MYALV02, Z_MYALV03) for editing/deleting, editing only and displaying only. Add the following coding to the report displaying your ALV grid:
      CASE syst-tcode.
        WHEN gc_tcode_create.    " 01
          " Allow all grid functions
        WHEN gc_tcode_change.  " 02
          " Suppress grid functions for deleting rows
        WHEN gc_tcode_display.  " 03
          " Suppress grid functions for editing/deleting
        WHEN others.
          RETURN.
       ENDCASE.
    Regards
      Uwe

  • How to create Authority check object

    Hello Gurus,
    How to create Authority-check object 'ZABC'
                                                             ID 'TABLE' FIELD 'ZTABLE'.
    Please tell me detailed procedure.
    Thanks in advance.
    Best Regards,
    zubera

    Dear Zubera,
    Creating Authorization Fields
    In authorization objects, authorization fields represent the values to be tested during authorization checks.
    To create authorization fields, choose Tools --> ABAP Workbench --> Development --> Other tools --> Authorization objects ® Fields.
    To create a authorization field:
    1. Choose Create authorization field.
    2. On the next screen, enter the name of the field. Field names    must be unique and must begin with the letter Y or Z.
    3. Assign a data element from the ABAP Dictionary to the field.
    4. If desired, enter a check table for the possible entries. For    more information about check tables.
    For more information about AUTHORITY-CHECK, see the keyword documentation of the ABAP Editor.
    You can often use the fields defined by SAP in your own authorization objects. If you create a new authorization object, you do not need to define your own fields. For example, you can use the SAP field ACTVT in your own authorization objects to represent a wide variety of actions in the system.
    Assigning an Authorization Object to an Object Class
    Each authorization object must be assigned to an object class when it is created.
    Choose Tools --> ABAP Workbench --> Development --> Other tools --> Authorization objects --> Objects.
    You can also create authorization objects in the Object Navigator (SE80).
    Creating / Choosing Object Classes
    The system displays a list of existing object classes.
    Object classes are organized according to the components of the system.
    Before you can create a new object, you must define the object class for the component in which you are working. The objects are not overwritten when you install new releases.
    You can also define your own object classes. If you do so, select class names that begin with Y or Z to avoid conflicts with SAP names.
    Creating an Object
    Enter a unique object name and the fields that belong to the object. Object names must begin with the letter Y or Z in accordance with the naming convention for customer-specific objects.
    You can enter up to ten authorization fields in an object definition. You must also enter a description of the object and create documentation for it.
    Ensure that the object definition matches the AUTHORITY-CHECK calls that refer to the object.
    Do not change or delete authorization objects defined by SAP. This disables SAP programs that use the objects.
    You can regenerate the profile SAP_ALL after creating an authorization object.
    Best Regards,
    Rajesh
    Please reward points if found helpful.

  • How to create authority check

    how to create authority check and how to apply for kunnr field near at selection-screen for validating this field, i mean is there any tcode for it becoz when i click on pattern button it ask authority check objectname (der r some inbuilt object already existing like s_carrid for airlines)

    You can find out the authority objects from transaction SU21.
    E.g. you can use the object V_KNA1_VKO to check the authority for given Sales Organizations.
    You can find this object under the category SD.
    Regards,
    Naimesh Patel

  • Authority Check on Value within standard transaction

    Hi Guruus !
    Let's state that a user is allowed and has the profile/role to access a given transaction, let's say MI01, but ME21N will do to !
    Now, actually, users are supposed an that project to be authorized on certain Storage Location (LGORT). How can we set the system so that they can input Storage Location Value they're not authorized on ?
    Is there a standard way to do that ? Or do we have to use some Exit/BAdI in every transactions to check if the input value are correct ?
    I also have the same concern about report transaction, such as ME2K (for example), while executinf (F8) them.
    Thx in advance for your clue,
    N H

    Hi,
    Please get the SU53 screen shot form user when he found error any object value then you will see the su53 screen shot complete path and assign accordingly.
    Anil

  • How  to check  table have  exists any views in oracle

    hi,
    how to check table have exists any views in oracle

    SELECT * FROM user_dependencies
    WHERE type='VIEW'
    AND referenced_type='TABLE'
    AND referenced_name ='Your_Table_Name' You may use dba_dependencies to find views in different schema.

  • How to quickly find roll of authority-check ?

    Is there a way to find the roll which defines the passing of an object when exuctued by
    AUTHORITY-CHECK
    with finance and controlling sometimes users have 10-30 rolles which has the same object .
    I was wondering if there is a standard report or something else where you can give the username, the object to be checked and which returns all the rolles and their appropiate attributes in each roll
    kind regards
    arthur de smidt

    Have a look at the report tree in transaction SUIM.
    "User -> Users by Complex Selection Criteria -> By Authorization Values " will probabely do what you want. Hit the 'roles' button in the report's result.
    Hope this helps
    Jurjen
    "User -> Users by Complex Selection Criteria -> Users by Complex Selection Criteria" also allows you to enter a username to filter on.
    Edited by: Jurjen Heeck on Mar 10, 2008 1:45 PM

  • SQ02 AUTHORITY-CHECK

    Hello,
    I try to control the access of the financial center of the table FICTR by FMFCTRT function AUTHORITY-CHECK in Infoset (SQ02 TX).
    I assume that this code is correct:
    AUTHORITY-CHECK OBJECT 'F_FICA_CTR'
    'd FM_AUTHACT 'FIELD '03'
    'd FM_FIKRS 'DUMMY
    'd FM_FICTR 'FIELD' XXX '. "XXX is the selected variable in the selection that I can not recover !!!!!
    IF sy-subrc NE 0.
    write 'NO ACCESS'.
    LEAVE LIST-PROCESSING.
    ENDIF.
    If someone could tell me what section of code must be placed and whether the program is correct (no error generation).
    Knowing that when I go into the code AT SELECTION SCREEN, I am automatically redirected to the code DATA??
    And how to retrieve FM_FICTR has been selected to power the test.
    Thank you in advance for your answers!

    Use the logical database as the data source for the query:
    " < ... > you should always use logical databases as the data source within InfoSets that are used for query-based reporting. Using a logical database as your data source guarantees that the SAP solution is smart enough to know which areas of the data a user is allowed to see so that only the appropriate data will show in an SAP query report. Regardless of what type of security access the person who created the report has, the system is smart enough to display only the appropriate data for the user executing the report. (Note that this is the case only when logical databases are used as the data source if a SAP query is created using an InfoSet that is based on anything other than a logical database (for example, a table, a table join, a program). It is fair to say that no security whatsoever is in place when the query is run because all records within the tables are displayed in the report output.)"
    Edited by: Jelena Perfiljeva on Jan 20, 2009 5:15 PM
    Edited by: Jelena Perfiljeva on Jan 20, 2009 5:15 PM

Maybe you are looking for