Authorization implementation

Hi.
I'm new to server side java, so need some advice. I should make some kind of an authorization page.
There is a database on server with login/passwords and some other info. There are also different sites on server, all in cgi/php. I should make a common login structure to authenticate a user to access some resource/pages on this server using database info.
It should work similar to this:
user types in an address www.my.com/library (wants to see books, he is allowed to access library due to db info)
A login page appears (this is my jsp). he logs in and redirected/sent to library main page. From here he can use library links until session expires. There mustn't be a direct link to library without loggin in.
How to realize this? Again, sites are in cgi/php under apache.
I am not good in server technologies, so please help!

Well, JSPs need a servlet engine, like Tomcat: http://jakarta.apache.org/tomcat/index.html
I would take a look through the documentation there and at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/Servlets.html
(keep reading streight through servlets, JSP, and at least to the end of the WebServices section of the Tutorial).
The way I do it, I put filters on all the pages I want the user to be signed-in for. In the filter, I check if there is a 'User' object in the session. If there is not, I redirect the user to the login page, which then forwards them to where they wanted to go. If there is already a 'User' in the session, I just let the request go without any changes...

Similar Messages

  • Anlysis authorization implemented after Cascading is not working

    Anysis authorization implemented after Cascading is not working.
    Example: i have 3 dropdownboxes in WAD . Frist dropdownbox State, second dropdownbox District, third dropdownbox Town.In the first dropdown box i selected state AP ,it should show only districts in AP in the second dropdownbox.
    But it is not showingin the second dropdownbox.
    Please help me

    Hi Priya,
    The issue may be due to the SQL Reporting Services maximum number of parameter items. We can try to add following code to Web.config file to resolve the issue.
    <appSettings>
    <add key="aspnet:MaxHttpCollectionKeys" value="30000" />
    <add key="aspnet:MaxJsonDeserializerMembers" value="30000" />
    </appSettings>
    (Note: We can according to our requirement to set these values. After that, restart all SQL Server services. )
    By default, the Web.config file is located in:
    C:\Program Files\Microsoft SQL Server\MSRS10_50.MSSQLSERVER\Reporting Services\ReportManager
    C:\Program Files\Microsoft SQL Server\MSRS10_50.MSSQLSERVER\Reporting Services\ReportServer
    More detail information, you can refer to the article about SQL Reporting Services maximum number of parameter items.
    http://sqlsrv4living.blogspot.in/2012/10/sql-reporting-services-maximum-number.html
    Regards,
    Alisa Tang
    Alisa Tang
    TechNet Community Support

  • Context Sensitive authorization implement in 4.6C

    Dear all,
    Is there any way to implement context sensitive authorization in 4.6C? Something like P_ORGINCON object in the newer version.
    I know the easiest way is to create two IDs for one user; one with each respective role/ structural authorization. Is there any other option?
    Thank you for all your input.

    Several years ago SAP were offering customers on release 4.6c the option of having the context sensitive solution retro fitted to their system.  It involved someone from SAP remotely logging into the customer's system and installing the required objects.
    I can't tell you what this cost, or even if they still do it, but you could check with your local SAP contact.  It might be easier (and cheaper) to upgrade to ERP....
    You can definitely map multiple portal users to one backend R/3 user quite easily, but I don't think you can do the reverse.

  • Authorization Implementation of JAAS

    Weblogic comes with JAAS based authentication and association of
    authenticated Subject
    with the caller thread of each Subject.doAs call.
    Now on the other side of the subject.doas call, all you can get back is the
    weblogic.security.acl.User object by calling Security.getUser(). I think
    this is quite a limitation that we can't get a full Subject object including
    all the prinicpals. Reason: I want to implement my own Authorization(JAAS
    based) and only user aint' gonna help me. This has been a major
    show-stopper in our Security Module which we had planned to make a totally
    pluggable solution.
    Any answers on how Weblogic can help guys like us, would be of great help.
    Narinder Gaheer - 408-808-6458
    mailto:[email protected]
    http://www.CallidusSoftware.com/
    The Business Performance Systems Company

    Weblogic comes with JAAS based authentication and association of
    authenticated Subject
    with the caller thread of each Subject.doAs call.
    Now on the other side of the subject.doas call, all you can get back is the
    weblogic.security.acl.User object by calling Security.getUser(). I think
    this is quite a limitation that we can't get a full Subject object including
    all the prinicpals. Reason: I want to implement my own Authorization(JAAS
    based) and only user aint' gonna help me. This has been a major
    show-stopper in our Security Module which we had planned to make a totally
    pluggable solution.
    Any answers on how Weblogic can help guys like us, would be of great help.
    Narinder Gaheer - 408-808-6458
    mailto:[email protected]
    http://www.CallidusSoftware.com/
    The Business Performance Systems Company

  • Structure Authorization Issue

    Hi guys,
    I don't have structure authorization implemented or HR system implemented. I was playing with my sandbox system to learn structure authorization by using step by step tutorial.  After I created a structure authorization for two users I deleted everything related to structure authorization but unfortunately, some t-codes related to org chart for example PPOME, PPOMW are not working properly, its not allowing to create new org char.
    We have another team needs to create some org chart for prototyping but they can't create org chart its giving no authorization error when I ran SU53 it's not giving regular auth error its also give failed HR structure authorization error, this is the error in su53 coming (Date 10/01/2010 and time Plan version 01 Object ID 5000075 Action LISD) there are so many different object ID on the list.
    They all already have SAP_ALL in the system. Can anybody give some kind of report so I remove structure authorization completely from the system.
    Please help
    Thanks

    Structural Authorization Check
    Structural authorizations are used to grant access to view information for personnel where HR OM has been implemented as we stated. The Access is granted to a user implicitly by the useru2019s position on the organizational plan.
    On top of the general authorization check, which is based on authorization objects, you can define additional authorizations by hierarchical structures.
    In each area, the combination of start object and [Evaluation Path|http://help.sap.com/saphelp_erp60_sp/helpdata/en/35/26c256afab52b9e10000009b38f974/content.htm] from an existing structure returns a specific number of objects. This exact combination, in other words the number of objects returned by this combination, represents a useru2019s [Structural profile|http://help.sap.com/saphelp_erp60_sp/helpdata/en/0c/49ba3b3bf00152e10000000a114084/content.htm]. So structural authorization check is therefore based on a Dynamic concept: The concrete objects that are returned by a structural profile change as the structure (under the start object) changes.
    Steps to Perform to Set Up Structural Authorization Check in brief:
    (Before start moving for str. auth profile it is assumed that the Switch AUTSW for HR General Authorization check is also activated in table T77S0. Structural Authorization won't give the access for accessing HR data as described in the last posts and works together with General Authorization - to remind you)
    1. Integration:  Control parameters for the integration of Personnel Planning and Development (PD) with other applications (such as Personnel Administration (PA) and Cost Accounting (CO), etc.) are specified in the "PLOGI" group.
    2. Turn on PD PA switch: TCode used is OOPS. Ensure value registered for PLOGI u2013 ORGA is X. No other values need to be checked or changed.
    (Note: PD and PA sub modules of HR are not configured to share data by default in the SAP delivered system. This switch must be on for data to flow between both modules.)
    3. Turn on Structural Authorizations Main Switches : TCode is OOAC. Value for ORGPD is set to 1.
    4. Create Org. Plan (check the first post).
    (Note: Do not create your Organizational Plan without this switch on. If you do, structural authorizations will not work and some org and infotype setup will not work. You cannot turn the switch on and get structural authorizations on an organizational plan, that was created while it was off, to work..)
    5. Create Personnel Master Record: Tcode is PA40. This is time consuming staff.
    6. Create record for Infotype 0105 - TCode is PA30.
    7. Create Structural Authorization Profiles u2013 TCode = OOSP
    8. Create entry for IT 1017 - TCode is PO10 (Organizational Unit) or PO13 (Position).
    9. Assignment of Structural Authorizations: The assignment of the Structural Authorization can be found with good details here in [SAP Help|http://help.sap.com/saphelp_erp60_sp/helpdata/en/97/27973b3ea3eb0fe10000000a114084/frameset.htm].
    Please check and let us know for any query.
    Regards,
    Dipanjan

  • Rollout project

    hi friends,
    can somebody explain in a rollout project
    what will happen to entp structure?
    what will happen to blue print ie as is and to be
    what will happen to document types will it be all the same
    whether the same team will be there
    what are all mandatory things in a rollout project
    if it is all same, we only do the configuration for the particular country related configurations or how
    thanks for answering

    Varada,
    In RollOut Also The ASAP methodology covers 5 stages namely:
    Stage 1: Project Preparation
    Stage 2: Business Blueprint
    Stage 3: Realization
    Stage 4: Final Preparation
    Stage 5: Go Live & Support (Rollout)
    Stage 1-Project preparation
    The core activities of this project include:
    • Establish project teams
    • Conduct kick-off meeting to confirm the project scope
    • Develop Project Charter
    • Perform review on all technical requirements of the project
    Stage 2-Business Blueprint
    The objective of this stage is to obtain a clear precise understanding of the detail
    functional requirements
    The major activities during this stage are as follows:
    • Develop System functional requirements
    • Develop System‘s data conversion and authorization strategy
    • Identify training needs
    • Determine reporting requirements
    • Determine interface requirements
    • Initiate change readiness Assessment
    Stage 3: Realization
    The project teams are focusing on the configuration of the SAP modules using agreed functional requirements. The core activities that are being carried out at this stage include:
    • Configure SAP modules/develop customized modules
    • Develop forms, reports and interfaces
    • Establish profiles for authorization
    • Implement data conversion and migration plan
    • Setup training environment
    • Conduct awareness program
    • Develop change infrastructure; conduct change management activities relating to
    communication and role definition
    Stage 4: Final Preparation
    Among the core activities to be carried out at this stage include:
    • Develop cut-over and go-live plan
    • Develop standard operating procedures
    • Develop offline procedures
    • Conduct end-user training for users at the pilot site
    • Complete the preparation of the production environment
    • Conduct communication and acceptance program
    Stage 5: Go Live & Support (Rollout)
    The final stage of the project relates to the roll out.. ie nothing but GO Live..
    The last phase of the implementation project is concerned with supporting and optimizing the operative R/3 System, both the technical infrastructure and load distribution as well as the business processes. Activities such as the following are carried out:
    Production support facilities are defined, for example, checking system performance on a daily basis
    Validation of business processes and their configuration
    Follow-up training for users
    Signoffs, etc.
    =====
    Rollout Roadmap
    The Rollout Roadmap has as its goal the creation of a local productive reference system and, in the case of distributed systems, the provision of a link to a central productive system in order to, for example, set up and maintain R/3 master records.
    The Rollout Roadmap speeds up the implementation process in the local units, so that – depending on the enterprise's requirements – entire implementation series can be carried out. Redundant project activities can thus be pinpointed and avoided. The advantages of this roadmap are:
    The realization of groupwide implementation standards, through an efficient rollout in the local units
    A rollback procedure for the exchange of general experiences, which can then be incorporated into the template. In this way the changes are passed on to the local units quickly and comprehensively.
    refer to the links below...
    http://www.sapfans.com/sapfans/asap/be_08_e.htm
    http://www.edgewater.com/Industries/Manufacturing/ManufacturingCaseStudies/caseStudies_finePaper.htm
    REAWRD IF U FINDS HIS AS USEFUL..
    Regds
    MM

  • Could anyone privide me a template ASAP for FI?

    Hi All,
    I'm looking for a template ASAP for FI.
    Could anyone help me?
    Thanks

    SAPu2019s IMPLEMENTATION METHODOLOGY u2013 AN INTRODUCTION
    SAP's methodology defines five phases for implementation
    1.0 Phases of the SAP Implementation Roadmap ( Adapted based on SAP's ASAP Methodology )
    Phase 1: Project Preparation
    During this phase the team goes through initial planning and preparation for SAP project.
    "Project formally initiated and planning well under way. "
    Phase 2: Business Blueprint
    The purpose of this phase is to achieve a common understanding of how the company intends to run SAP to support their business. The result is the Business Blueprint, a detailed documentation of the results gathered during requirements workshops.
    u201C Project team gathers requirements and conducts conceptual design of the solution.u201D
    Phase 3: Realization
    The purpose of this phase is to implement all the business process requirements based on the Business Blueprint. The system configuration methodology is provided in two work packages: Baseline (major scope); and Final configuration (remaining scope).
    u201C System solution built and integration tested, end users trained u201C
    Phase 4: Final Preparation
    The purpose of this phase is to complete the final preparation (including testing, end user training, system management and cutover activities) to finalize your readiness to go live. The Final Preparation phase also serves to resolve all critical open issues. On successful completion of this phase, you are ready to run your business in your live SAP System.
    u201C Authorization to cut over to new system solution u201C
    Phase 5: Go Live & Support
    The purpose of this phase is to move from a project-oriented, pre-production environment to live production operation.
    u201C Solution confirmation and project closure u201C
    2.0 Implementation Lifecycle is to provide recommended deliverables to support the activities-based methodology. This list of deliverable will to be used by program/project team leads at the beginning of an implementation program and throughout. This will help to ensure an understanding of the methodology in terms that are easy to relate to and help to establish the program time line.
    Deliverables are defined as u201Ca result u2013 evidence of which is provided by something tangible such as a document or by observation or by measurement, which is important to the success of the project or program.u201D This differs from milestones that are described as u201CAn event of special importance, usually representing the completion of a major phase of project work. Reviews are often scheduled at milestones.u201D
    Deliverables will not replace the content-rich roadmaps, but provide a front-end that identifies the WBS number of the applicable work steps in the roadmap. It is for this reason that description of outcomes, and roles associated with outcomes, are not included in the document, as this would be redundant to what is already in the roadmap.
    Phase 1 : Project Preparation
    The purpose of this phase is to provide initial planning and preparation for your SAP project. Although each SAP project has its own unique objectives, scope, and priorities; the steps in Phase 1 help you to identify and plan the primary focus areas that need to be considered.
    The key deliverables for this phase include:
    u2022     Initial Project Planning and Kick-Off
    u2022     Project Procedures and Standards
    u2022     Ongoing Project Management
    u2022     Training Plans
    u2022     Quality Management Project Preparation
    u2022     Milestone: High Level Business Requirements Completed
    Phase 2 : Business Blueprint
    The purpose of this phase is to create the Business Blueprint, which is detailed documentation of the results gathered during requirements workshops. Furthermore, the Business Blueprint documents the business process requirements of the company. With this, you can better understand how the company intends to run its business within the SAP System.
    The key deliverables for this phase include:
    u2022     General Project Management
    u2022     Organizational Change Management
    u2022     Training and Documentation Plan
    u2022     Business Process Blueprint
    u2022     Development Procedures and Requirements
    u2022     Milestone: Business Blueprint Completed
    u2022     User Roles, Authorizations Requirements and Design
    u2022     Quality Management Business Blueprint
    u2022     Milestone: Project Implementation Environment Ready
    Phase 3 : Realization
    The purpose of this phase is to implement business and process requirements based on the Business Blueprint. The objectives are final implementation in the system, an overall test, and the release of the system for production (live) operation. In addition, the project team receives relevant knowledge.
    The key deliverables for this phase include:
    u2022     General Project Management (Realization Phase)
    u2022     Organizational Change Management (Realization Phase)
    u2022     Training and Documentation Plan (Realization Phase)
    u2022     User Roles and Authorizations Implementation
    u2022     Development and Customization
    u2022     Baseline Configuration and Confirmation
    u2022     Functional and Performance Test Planning
    u2022     Final Configuration and Confirmation
    u2022     Final Integration Test
    u2022     Milestone: Core Business Processes Implemented
    u2022     Quality Management Realization
    Phase 4 : Final Preparation
    The purpose of this phase is to complete the final preparation (including testing, end user training, system management and cut-over activities), to finalize your readiness to go live. The Final Preparation phase also serves to resolve all crucial open issues. On successful completion of this phase, you are ready to run your business in your live SAP System.
    The key deliverables for this phase include:
    u2022     General Project Management (Final Preparation Phase)
    u2022     Functional and Performance Tests Execution
    u2022     Milestone: Project Implementation Completed
    u2022     Cutover and Production Support
    u2022     Quality Management Final Preparation
    u2022     Milestone: Start of Production
    Phase 5 : Go-live & Support
    The purpose of this phase is to cut over to live productive operation and to continuously support and improve live operations. There are two distinct periods of this phase:
    Project End
    During the time when the system is first live, all issues and problems are resolved, transition to the production support team finalized, knowledge transfer completed, and the project signed off.
    Continuous Improvement
    Now that the project is over, the production support team monitors the system and resolves live business process issues. Proper change management procedures are established and ongoing end user training is conducted. Plans are made to continuously review and improve business processes.
    The key deliverables for this phase include:
    u2022     Project End
    u2022     Milestone: Handover Completed
    u2022     Continuous Improvement

  • How to implement complex analysis authorizations in simple way

    Hi All,
    I need to create some analysis authorizations with long list of single values for a characteristics. For example, we have multiple set up of company codes (APAC, EAME, AMERICAS, etc) and each set contains 150 - 200 company codes in it. Now we have multiple combinations of company code set and geographies. In short, we will have multiple analysis authorizations and each will have one or two set of company codes and some geographies.
    I can create the analysis authorizations for the first time, by putting individual values in the respective characteristics. That would be a big task but can be done. But the problem is about ongoing maintenance. In future, if a new company code is added to lets say APAC companies, then we will have to update all analysis authorizations which contains APAC company code and that would be huge number of AAs due to the complexity of business architecture.
    Could anyone please suggest if it is possbile (and how) to do below or similar, or have any other better approach (using BW7.4)
    - We would create a group (or set) of company codes. Lets say would create a group APAC_Comp_Code and add all APAC related company codes in it. This would be repeated for all set of compant codes.
    - While creating analysis authorizatons, I would not assign any individual company code value in characteristic, instead put APA_Comp_Code inside the characteristic 0COMP_CODE.
    - If I need to put multiple set of company codes inside 0COMP_CODE, I will just put the corresponding group name, not the invidual values.
    The benefit would be that in future if I need to add a new company code to APAC, I would just have to update this group APAC_Comp_Code. I will not have to maintain the analysis authorizations.
    Please let me know if this is possible or if there is any other way to implement the requirement with simpler maintenance.
    Thanks
    Nitesh Gupta

    Hi Nitesh,
    From what you describe, this would be a good case to use variables in your analysis authorisations. You can specify a variable value for the BUKRS field and have a couple of options to populate the values which are picked up in the query execution.
    You will need to ensure that you activate the istep to read customer exit variables and have the query variable set as customer-exit. Once those are complete, you can create a custom table to maintain the mapping of groups to company codes, or to read the company codes directly from your ERP system (if you want to base authorisations on what the users can see in ERP) and populate the table with those values.
    However you populate the value to the variable, I think this approach will get you closer to minimal maintenance going forward. Enhancement RSR00001 should be implemented, some help documentation for this below
    http://help.sap.com/saphelp_nw70/helpdata/en/1d/ca10d858c2e949ba4a152c44f8128a/content.htm
    Hope this helps,
    Tom

  • How to implement Custom Authentication and Authorization in Oracle SOA 11g

    Can anyone please tell me, how to implement Custom Authentication in Oracle SOA 11g ?
    Because in Oracle SOA 10.1.3.4 , i have implemented this custom authentication and authorization by implementing BPMAuthenticationService, BPMAuthorizationService, BPMIdentityService to verify againt my database systems.
    implementation classes like the mentioned below
    1).
    public class SampleAuthenticationService extends SampleServiceBase implements BPMAuthenticationService {
    2).
    public class SampleAuthorizationService extends SampleServiceBase implements BPMAuthorizationService {
    3).
    public class SampleIdentityService extends SampleServiceBase implements BPMIdentityService {
    Please help me to implement the authentication and authorization in Oracle SOA 11g .
    thanks in advance

    To start with please go through following document
    http://docs.oracle.com/cd/E21764_01/integration.1111/e10231/adptr_jms.htm
    http://docs.oracle.com/cd/E23943_01/integration.1111/e10231/adptr_file.htm
    Regards
    Arpit

  • Find authorization check in BAPI implemented in a program

    Dear ,
    How can we find the authoruty check in a program in which a BAPI is used.If we search authority check in program click search button and find authority then only the authorization check implemented in program except BAPI is shown not in BAPI.
    Kindly send me solution ASAP.
    Regard,
    Yatendra Sharma
    Edited by: yatendra sharma on Mar 19, 2009 12:42 PM

    Hi Yatendra,
                      May be this code works out for you .It is just a dummy code.Try using Authority Check.Hope your query resolves soon.
    authority check
    PERFORM <AUTHORITY CHECK> USING <TABLE>.
    IF NO_AUTHORITY NE SPACE.
       PERFORM BAPIRETURN TABLES RETURN
                               USING  u2018VALUE1'
                                      u2018VALUE2'
                                      u2018VALUE3'
                                      VALUE4
                                      VALUE5.
        EXIT.
    ENDIF.
    Have a best day ahead.

  • Implement an authorization scheme using to check users

    Hello,
    I want to implement an authorization scheme for my application in which i want to
    give access to only threee users to view my application. Can anyone help me what would be my pl/sql expression.
    something like :APP_USER in ('R123',Y7654','TY7890')
    can anyone help me with what type of scheme I need to create??
    thanks,
    orton

    Hi,
    I have exactly similar application for my organisation with SSO organisation, but the application need to be accessed only by my TEAM members
    What is did is i created a user table.. that will hold the user detail like email id , etc..
    after that i went to shared component -> Security -> authorization scheme
    Clicked on create button to create new authorization scheme..
    Selected From scratch option .
    Give a name to the authorization scheme.. i named is as VALID USERS
    Scheme type - select Exits SQL Query
    then in expression 1 i entered
    select * from user_table where upper(user_email_id) = upper(:APP_USER)
    and in error message enter ...Unauthorized USER.
    Regards,
    Shijesh

  • Implementing authorization based on database roles

    Hi,
    I am trying to implement authorization in my sample jdeveloper application.
    I have the list of users stored in LDAP and my database table contains the roles for those users.
    Now how can I get the roles from the database table and implement authorization based on the roles?
    I am using jdev 11 and weblogic 10.3
    Thanks

    Hi,
    Checkout [this post|http://forums.oracle.com/forums/thread.jspa?threadID=928304]
    Sireesha

  • Authorization Role Practice in Implementation Project

    Gurus,
    Okay, I've been implementing SAP R/3 for around 5 implementation cycles, before realizing my method for creating role may be outdated. I need your advice regarding this.
    Here's my common scenario on every implementation project in realization phase:
    1) Functional Consultants hand over their authorization matrix to me
    The matrix will be the role name to created, along with its transaction code and authorization object.
    There's also user assignment to each role.
    2) I created the role in PFCG.
    Reference, single, composite role. Anything you can build in it.
    3) Map the SAP user to appropriate role
    Now here's the interesting part.
    Users will then be given their own SAP User on UAT phase.
    When they try to do transactions, almost every time, every one of them'll stumble upon "No authorization" error.
    What I do is, check their SU53 object, add corresponding object, then let them test again whether it fixes the error.
    The authorization matrix given by consultants will not have every needed auth. objects.
    It can't be helped. You can't also just put the Full Authorization (*) to object you don't familiar with.
    How do you usually do this?
    Any helpful tools?
    Thanks for help.
    Regards,

    Hi,
    Generally role matrxi should contains every info what eve they needed to create the Role for the functional folks.
    in you case there is some missing things that is interrupting you so better you can focus on Standard SAP roles and study that roles properly before you creating any Customizatio roles.
    so that you will get an idea what are all the objects you have to use to create MM roles and also what are all the objects you have to use to create SD roles etc etc....
    so please try to read the Standard role first before creating the custmoiztion roles.
    -Srini

  • Authorizations....for a new BW implementation

    Hi Gurus
    We are implementing BW for CRM Analytics. I am a kind of struck in the authorizations area. The requirement for us is,
    We have IT Services and R&D Services as 2 units. In IT Services I have 6 Organizational units as ITINDIA, ITUS, ITUK, ITUE, ITSG, ITJP for different countries. The organizational units will be valid for R&D Services with RDIN, RDUS, RDUK, RDUE, RDSG and RDJP. The requirement for the authorizations is something like this, the ITIN Business Development Manager should see only the India related data and so on and so forth.
    Now i have created 6 roles for ITIN and so on and assigned a test user to that and made the Resp. Organizational Unit in Sales - 0CRMSA_OG_R (this info object is been used in queries for the Organizational unit) as authorization relevant. I have done with the authorization part in RSSM and PFCG, but when i execute the queires using the test user i am getting all the data related to all the geographies in display for the test user. Is there anything i am missing here.
    Please advice me.
    Points will be assinged in full for the solution(s).
    Regards
    Vijaykumar

    Hi Kamal
    Thanks for the quick reply. Well, we have installed all the standard queries from the business content and with that it has identified some standard roles also. Can i use the standard roles in anyway.
    Or else can you just elaborate me the process with which i can identify the authorizations for the present scenario.
    Thanks and regards
    Vijaykumar

  • Implement new authorization object in MRBR (SU24)

    Hi,
    I'd like to add a new authorization check in transaction MRBR.
    I tried with SU24 -> MRBR -> adding object M_RECH_BUK with "CM" check ID.
    When testing : nothing appened (no check made).
    After reading all SDN posts about SU24, i think i'd to implement an "authority-check" on M_RECH_BUK in MRBR coding. And i don't like this....
    Do you think i can do this check in MRBR using user-exit ?
    Thanks a lot for your response.
    Etienne

    Hi,
    Below are the User-Exits for the T.CODE MRBR
    Exit Name           Description                                                                               
    <b>LMR1M001</b>            User exits in Logistics Invoice Verification                 
    <b>LMR1M002</b>            Account grouping for GR/IR account maintenance               
    <b>LMR1M003</b>            Number assignment in Logistics Invoice Verification          
    <b>LMR1M004</b>            Logistics Invoice Verification: item text for follow-on docs 
    <b>LMR1M005</b>            Logistics Inv. Verification: Release Parked Doc. for Posting 
    <b>LMR1M006</b>            Logistics Invoice Verification: Process XML Invoice          
    <b>MRMH0001</b>            Logistics Invoice Verification: ERS procedure                
    <b>MRMH0002</b>            Logistics Invoice Verification: EDI inbound                  
    <b>MRMH0003</b>            Logistics Invoice Verification: Revaluation/RAP              
    <b>MRMN0001</b>            Message output and creation: Logistics Invoice Verification  
    it is better if you write a Field exit on the Field <b>M_RECH_BUK</b>
    For the Field exits,
    http://www.sapgenie.com/abap/fieldexits.htm
    http://www.sap-img.com/abap/field-exits-smod-cmod-questions-and-answers.htm
    Thanks
    Sudheer

Maybe you are looking for

  • HP LaserJet Pro m201dw suddenly not printing via ethernet (wired) network using Mac OS 10.10.1

    Hi, My brand-new HP LaserJet Pro M201dw is suddenly not cooperating when I go to print using my Mac. I had it set up following the directions which closest matched my OS and it worked perfectly for one week; today suddenly it won't cooperate. The pri

  • How do I display thumbnails for subfolders with images in Finder?

    Hello. I've settled in quite nicely with OS X but I find there's one thing I couldn't replace with a better alternative from XP and I've looked extensively for a solution but with no luck, so I figured I'd ask. It's best described with a picture (htt

  • Managed server startup script not reading login info from boot.properties

    To encrypt the username and password in weblogic admin server, I used a boot.properties file and setting some properties like StoreBootIdentity=true. This works as expected. Now, I have a weblogic managed server within the same folder i.e. under /bea

  • SATA DVDrom copies files, but won't play music

    I installed a new SATA DVD/CD-rom.  I'm using Gnome3.  When I insert an audio disk, it shows up in the file nautilus ( although I don't see where it mounts?) If I try to play the songs through VLC, or anything else, the sound is very soft and only pa

  • Wrt350n storage link

    I want to be able to access my 120g hard drive that is plugged into my wrt350n via the usb port.  I want to access it from remote pc's and give others access to these files I cant find the directions, and the guy at linksys discouraged me after the s