Authorization SM_EFWK and SM_EXTERN_WS

Hi everybody,
could you somebody explain me, why system users SM_EFWK and SMD_RFC need change (activity 02) in authorization object AI_LMDB_OB? I found object in assinged role SAP_SOLMANDIAG_E2E, but only with activity 03 (READ). Trace analysis ST01 showed me following errors.
Should I give activity 02 to these users or not? I don't know If It is purpose or error by SAP.

Here is text information of authorization issue. I have no patience fill Tags with "clever" prediction.
AI_LMDB_OB RC=4  ACTVT=02;LMDB_DOMA=LDB;LMDB_NAMES=ACTIVE;LMDB_MTYPE=HOST;LMDB_STYPE= ;LMDB_OBJID=*;
AI_LMDB_OB RC=4  ACTVT=02;LMDB_DOMA=LDB;LMDB_NAMES=ACTIVE;LMDB_MTYPE=TECSYST;LMDB_STYPE=*;LMDB_OBJID

Similar Messages

  • TS1389 i keep having a "the iphone could not be sync because the computer is no longer authorized" i authorize it and still no result

    i keep having a "the iphone could not be sync because the computer is no longer authorized" i authorize it and still no result

    i keep having the same problem, my little cousin changed the passcode to my iphone 4s and she cant remember it. I've tried transfering all data(apps, movies ect..)to my computer but it says i need authorisation, i put in my apple id and it says i am already logged on to 3 out of 5 computers so i press ok and it goes back to the apple id thingy! please someone help me becausei need to access my phone!!!!!!!
    Anyone what do i do!

  • When i try to sync my iphone 5c to my itunes it says my computer is not authorized.  I've gone through the authorize steps and restarted my computer.  It says "already authorized," yet the phone still won't sync saying, "computer unauthorized."

    When i try to sync my iphone 5c to my itunes it says my computer is not authorized.  I've gone through the authorize steps and restarted my computer.  It says "already authorized," yet the phone still won't sync saying, "computer unauthorized."

    Click here and follow the instructions.
    (91121)

  • Certain songs wont transfer from Itunes to Iphone, telling me to authorize computer and when I do so, it's telling me that computer is already authorized. So why am I not able to tranfer certain songs from itunes to my iphone?

    Certain songs wont transfer from my itunes to my iphone, it's telling me that the computer is not authorized but once I go up to Store and authorize computer and enter in my info, it tells me that the computer is already authorized. So why am I not able to transfer certain songs from my itunes to my iphone?

    Hello Jfalconi19,
    Thank you for providing the details of the issue you are experiencing with transferring the apps purchased from the iTunes Store.  I recommend following the steps in this article:
    iTunes repeatedly prompts to authorize computer to play iTunes Store purchases
    http://support.apple.com/kb/ts1389
    Thank you for using Apple Support Communities.
    Best,
    Sheila M.

  • Song won't play because is is not authorized on this computer, but then try to authorize it and it says it's already authorized

    I have purchased a song from the same computer on itunes that my library plays from. However this certain song is grayed out and will not play.  It says the song is not authorized on this computer, but then I try to authorize it and I get a message that this computer is already authorized. Any ideas?

    That suggests the track is damaged.
    If your country's iTunes Store allows you to redownload purchased tracks, I'd delete your current copy of the track and try redownloading a fresh one. See the following document for instructions:
    Downloading past purchases from the App Store, iBookstore, and iTunes Store
    Otherwise, I'd report the problem to the iTunes Store.
    Log in to the Store. Click on "Account" in your Quick Links. When you're in your Account information screen, go down to Purchase History and click "See all".
    Find the item that is not playing properly. If you can't see "Report a Problem" next to the item, click the "Report a problem" button. Now click the "Report a Problem" link next to the item.

  • Learning SAP BW authorizations structure and hierarchy  -  concepts

    Hello Experts,
    I need a good document for learning Authorizations structuring and hierarchy in SAP BIW 3.5 . I am giving authorizations in BIW but do not hv conceptual nd fundamentalistic knowledge of SAP BW authorizations and its structure . Plz send a good document for learning BW authorizations .............................it may be an excerpt frm FU&FU guide. My Email Id is [email protected]
    A short but complete SAP BW fundamentalistic , concepts and structure & hierarchy covering document is appreciated.
    Requested to revert at earliest as this is very urgent.
    Points guaranteed.
    Regards,
    Somya

    Hi maheshwari ,
    Use these steps for authorizations,
    1.before going to authorizations u have to decide on which Infoobject u have to apply authorizations.
    EX: SD--- Sales Org, MM -> palnt ,purorg,FI> companycode.
    first u ahve to decide which area & on which Infoobject.
    2.goto that Infoobject --> change there check the checkbox Authorization relavent object cahechbox
    2.after that U Have to goto RSSM there u have to create authorization object
    Ex: Zxxx ( XXX is Infoobject Name ).
    3. In the same transaction Screen u have Infocube selection radio Button check that then select on which cube(cube means under that cube all Quaries) u have to make authorization for that perticuler Infoobject.
    4.next goto PFCG create role & save it
    5.goto Authorization tab in that selct edit authorization it will give automatiaclly authorization Templates in that u have to select only S_RS_RREPU & press Enter.
    6. Select manual pushbutton it will ask authorisation object enter ur authorization object what u have created ( zxxx) .
    7.click generate +enter
    8. goto user tab Enter userId+enter + click on usercomparision+ enter
    9.save the role.
    FOR HIRARCHIES:
    1. goto RSSM There u have one rediobutton called authorization hierarchy ( this radio button is very below the RSSM screen)
    2. there u have to select Hierachy on which u have to apply authorization.
    Thanks,
    kiran

  • Table Name - For Authorization objects and fields.

    Hi
    Could any  one let me Know In which Table Authorization Objects and Authorization fields are stored.
    Thanks N Regards.
    Priya

    hi,
    TOBJ ---> Authorisation Objects
    Refer to the link.
    http://saptechnicalinfo.blogspot.com/2008/07/sap-authorization-objects-tables.html
    Regards
    Sumit Agarwal

  • Authorization checks and objects

    Do you have a tutorial for this topic for dummies? thanx in advance

    Hi
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    Thanks
    Seshu

  • What is authorization object and how to create it for a table

    Hi All,
    What is authorization object and how to create it for a table?
    Thanks

    Hi
    Authorization
    For authorization checks, there are many ways of linking authorization objects with user actions in an SAP system. The following discusses three possibilities in the context of ABAP programming.
    Authorization Check for Transactions
    You can directly link authorization objects with transaction codes. You can enter values for the fields of an authorization object in the transaction maintenance. Before the transaction is executed, the system compares these values with the values in the user master record and only starts the transaction if the appropriate authorization exists.
    Authorization Check for ABAP Programs
    For ABAP programs, the two objects S_DEVELOP (program development and program execution) and S_PROGRAM (program maintenance) exist. They contains a field P_GROUP that is connected with the program attribute authorization group. Thus, you can assign users program-specific authorizations for individual ABAP programs.
    Authorization Check in ABAP Programs
    A more sophisticated, user-programmed authorization check is possible using the Authority-Check statement. It allows you to check the entries in the user master record for specific authorization objects against any other values. Therefore, if a transaction or program is not sufficiently protected or not every user that is authorized to use the program can also execute all the actions, this statement must be used.
    AUTHORITY-CHECK OBJECT object
                            ID name1 FIELD f1
                            ID name2 FIELD f2
                            ID namen FIELD fn.
    object is the name of an authorization object. With name1, name2 ... , and so on, you must list all fields of the authorization object object. With  f1, f2 ... , and so on, you must specify the values that the system is to check against the entries in the relevant authorization of the user master record. The AUTHORITY-CHECK statement searches for the specified object in the user profile and checks the useru2019s authorizations for all values of f1, f2 ... . You can avoid checking a field name1, name2 ... by replacing FIELD f1  FIELD f2 with DUMMY.
    After the FIELD addition, you can only specify an elementary field, not a selection table. However, there are function modules available that execute the AUTHORITY-CHECK statement for all values of selection tables. The AUTHORITY-CHECK statement is supported by a statement pattern.
    Only if the user has all authorizations, is the return value sy-subrc of the AUTHORITY-CHECK statement set to 0. The most important return values are:
    ·        0: The user has an authorization for all specified values.
    ·        4: The user does not have the authorization.
    ·        8: The number of specified fields is incorrect.
    ·        12: The specified authorization object does not exist.
    A list of all possible return values is available in the ABAP keyword documentation. The content of sy-subrc has to be closely examined to ascertain the result of the authorization check and react accordingly.
    REPORT demo_authorithy_check.
    PARAMETERS pa_carr LIKE sflight-carrid.
    DATA wa_flights LIKE demo_focc.
    AT SELECTION-SCREEN.
      AUTHORITY-CHECK OBJECT 'S_CARRID'
                      ID 'CARRID' FIELD pa_carr
                      ID 'ACTVT' FIELD '03'.
      IF sy-subrc = 4.
        MESSAGE e045(sabapdocu) WITH pa_carr.
      ELSEIF sy-subrc <> 0.
        MESSAGE e184(sabapdocu) WITH text-010.
      ENDIF.
    START-OF-SELECTION.
      SELECT  carrid connid fldate seatsmax seatsocc
        FROM  sflight
        INTO  CORRESPONDING FIELDS OF wa_flights
        WHERE carrid = pa_carr.
        WRITE: / wa_flights-carrid,
                 wa_flights-connid,
                 wa_flights-fldate,
                 wa_flights-seatsmax,
                 wa_flights-seatsocc.
      ENDSELECT.
    Regards
    Hitesh

  • Table showing Authorization group and Package

    Hi
    Is there any table where we can see the list of programs using BOTH selection crieteria Authorization group and package together?
    Your help and time will be really appreciate.
    Thanks,
    Niki.

    Hi Niki,
    Try se84->Other Objects->Authorization Objects->choose one->Process->Complete list button on aplication toolbar.
    Regards
    Marcin

  • After BI 7.0 Upgrade, Authorization Roles and profiles are not visible

    Hi Gurus,
    We have an issue with authorization roles and profiles are not visible for all end users with new Bex Analyzer (BI 7.0) tool. But still they can see these roles with old Bex Analyzer ( Bex 3.5) tool.
    As a developer I have SAP_ALL acces and I can see all authorization roles in new BEx Analyzer (BI 7.0).
    I verified in SU01 for user access and every are assigned there roles and they are green.
    Do we need to add any new authorization object to fix this issue, please let me know
    Thanks and appreciate your help.
    Thanks
    Ganesh Reddy.
    Edited by: Ganesh Reddy on Oct 26, 2009 4:41 PM

    Hi Ganesh,
    check the behaviour, if you assign
    S_USER_AGR                          
       ACT_GROUP = "..name of the assigned role.."
       ACTVT = 03 (for "display")    
    b.rgds,
    Bernhard

  • POP capabilities are gotten in authorization mode, and not transaction mode

    I am using Javamail in an email client that requires UIDL support for POP3 servers. There are some servers that return the UIDL capability only in transaction mode, not in authorization mode (eg. pop.aol.com). I am unable to connect to such servers once I upgraded to javamail 1.4.4, since it is now looking at the capabilities before executing the UIDL command. However, it gets the capabilities in authorization mode, and servers like the one above do not send the UIDL capability in this mode. If the capabilities were refreshed in transaction mode (once login was done), UIDL would be returned. This looks like a bug. Is there a workaround for this?

    This definitely looks like a bug in AOL's server, please report it to them.
    RFC 2449 says:
       A capability description MUST document in which states the capability
       is announced, and in which states the commands are valid.
       Capabilities available in the AUTHORIZATION state MUST be announced
       in both states.
       If a capability is announced in both states, but the argument might
       differ after authentication, this possibility MUST be stated in the
       capability description.
       (These requirements allow a client to issue only one CAPA command if
       it does not use any TRANSACTION-only capabilities, or any
       capabilities whose values may differ after authentication.)
    6.8.  UIDL capability
       CAPA tag:
           UIDL
       Announced states / possible differences:
           both / noThis says to me that the UIDL capability, if supported, must be announced in both states
    and must not change between states.
    You can set the session property mail.pop3.disablecapa to "true" to disable the use of the CAPA
    command, which will cause it to assume UIDL is supported.

  • Authorization standards and policies

    hello guru's
    i am junior security guy. i am in starting stage of implementing  security. please let me know the
    Authorisation standards and policies for implementing. <removed_by_moderator>
    authorizations
    thanks
    Ramesh
    Edited by: Julius Bussche on Feb 2, 2008 1:29 PM

    Hi Ramesh,
    Welcome to the world of SAP BASIS.Keep this in your mind if you are going to handle SAP roles and authorization project :-
    Every company have different authorization policies there is no single document available for this but you may no need to that much worry because if you are Jr. basis consultant then you may not have to design the authorization policies and also
    there should be one Sr. for each module who will tell you the required authorization objects or the set of transactions needed for the consultants under him.you just have to execute what they say.for this you need to run T-code - PFCG.
    just study the concept of master role ,derived role.
    just Ask if you have any doubt in roles and authorizations.
    Best of Luck  !
    Regards,
    Rohit

  • Question about  SAP's predefined authorization roles and responsibilities

    Hi,
    Is  there  a document (like a best practice document) that talks about what are the SAPu2019s predefined roles to be assigned to different responsibilities(like Basis, ABAP Developer, ABAP Developer for HR etc, Functional Configuration etc)?. If anybody have seen this document, please send the URL for that.
    I am seeing SAP AUTHORIZATION SYSTEM and SAP AUTHORIZATION MADE EASY books in the market.
    But these books talk  about authorization concept up to 46C only( I might be wrong).
    Please advise about any latest book on SAP Authorization that talks about NW(ABAP + JAVA)  also.
    Thanks.
    Raj.

    Hi
    The following link help your requirement on documentation.
    http://help.sap.com/saphelp_banking463/helpdata/en/23/07d128f31011d296330000e82de14a/content.htm
    Regards
    Shan

  • Authorization Object and Authorization...!!!

    Hi BW Experts,
    Could anyone plz tell me what is the difference between Authorization Object and Authorization..!!!
    Thanks in Advance.
    Regards,
    Giftedbrain.

    Giftedbrain,
    Authorization Object:
    An authorization object groups up to ten fields that are related by AND.
    An authorization object allows complex tests of an authorization for multiple conditions. Authorizations allow users to execute actions within the system. For an authorization check to be successful, all field values of the authorization object must be appropriately maintained in the user master.
    Authorization objects are divided into classes for comprehensibility. An object class is a logical combination of authorization objects and corresponds, for example, to an application (financial accounting, human resources, and so on). The line of the authorization object class is colored orange in the profile generator.
    For information about maintaining the authorization values, double click an authorization object.
    The line of the authorization object is colored green in the profile generator.
    Authorization:
    Definition of an authorization object, that is, a combination of permissible values in each authorization field of an authorization object.
    An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    Authorizations allow you to specify any number of single values or value ranges for a field of an authorization object. You can also allow all values, or allow an empty field as a permissible value.
    If you change authorizations, all users whose authorization profile contains these authorizations are affected.
    As a system administrator, you can change authorizations in the following ways:
    ·        You can extend and change the SAP defaults with role maintenance.
    ·        You can change authorizations manually. These changes take effect for the relevant users as soon as you activate the authorization.
    The programmer of a function decides whether, where and how authorizations are to be checked. The program determines whether the user has sufficient authorization for a particular activity. To do this, it compares the field values specified in the program with the values contained in the authorizations of the user master record.
    The line of the authorization is colored yellow in the profile generator.
    -Doodle

Maybe you are looking for

  • CUCM 8.6 update to CUCM 10.5

    Hii, I have 2 UCS from Cisco with 3 virtual machine ( 1 PUB - 1 SUB - 1 VoiceMail) I will write the steps in order to make the upgrade, pls write if I miss something or I am wrong. 1. I will update on cucm8.6 all the device to firmware supported in c

  • E51 Kern-Exec 0 Erorr

    Hi to everyone! I upgraded my E51 to newest firmware (400.34.011) using nokia Nokia Software Updater and after that run in trouble with Kern-Exec 0 Error. Have absolutely no idea why and when it shows up. Mostly I get it when I just lock keypad. Rese

  • Combined Upgrade and Unicode conversion question

    Hello Everyone, I will be performing combined Upgrade and Unicode conversion soon. Currently i have run Prepare and do not have any errors. I have already run SPUMG consistency check and i do not have any errors there. Since this is Combined Upgrade

  • Unable to view tabs and layouts on web sites

    When I log into myspace or Facebook I am unable to view tabs or page layout. Even at yahoo, My pages come out plain == This happened == Every time Firefox opened == As soon as I downloaded Fire Fox

  • Database records

    hey guys i implemented lsmw with recording, the application which i used is coaded based on a structure finally i am able to process all the records successfully in batch session method but how to find the records in the data base where these records