End User Authorizations and Roles

Hi,
What all the authorizations i need to give to an End User, who uses the device.
Is it necessary for the userid to be same in <b>MI Client, MI server, Backend</b> systems.
Let me explain wat an end user does
>logs into MI client
>performs first synchronization
>Executes Mobile Application assigned
>and performs synchronization at the end of the day
rgds,
Kiran

Hi Kiran
   Probably I wanst clear with my reply.  You need to assign both the above mentioned authorizations to the same user who is performing a sync from the MI Client.  S_ME_SYNC is required for the user to perform a sync from MI Client to MI server.  S_RFC is required for the same user so that the data can be transferred from MI server to SAP backend and vise versa. 
Hope I am clear now
Best Regards
Sivakumar

Similar Messages

  • Check users authorizations and role

    Hello!
    How can I check the authorizations of
    Web Dynpro application users and also his role.
    Thanks
    rgds
    sas

    HI,
    Pl go through Following link
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs/library/webdynpro/wd%20java/web%20dynpro%20security.pdf
    https://help.sap.com/javadocs/index.html
    use the method isMemberOfRole.
    Regards
    Ayyapparaj

  • End User Unlock and Password Reset in GRC AC 10.0

    Hi Dears,
    I have an issue related to End User Unlock and Password Reset.
    We maintained Data Source as SU01 in SPRO, So that User can able to access GRC Application through End User Login with ECC System login
    Details for raise a request.
    If user is locked or forget ECC system password, then user not able to access GRC Application through End User Login with ECC System login Details for Unlock or reset Password.
    In this situation, how user can unlock or reset the Password for ECC System.
    Could you please provide the solution to resolve the Issue.
    Note:- No LDAP or Acitive Directory.
    System Details :- GRC AC 10.0 , SP12.
    Regards,
    Karnatak.

    Hi Rupesh
    That was my warning on the post I linked you to
    Quite a few PSS solutions have this as a setup (even SCN). The key thing you are reliant on is that the email account must be restricted to only the user to receive the password/link as well as appropriate Challenge Response Questions defined as part of their registration.
    But yes, they can technically enter any User id to request the password and if they know the answers to the questions then they will get the password issue.
    Your alternatively is to introduce another system (i.e. AD which you ruled out) or see if there is a way to introduce a second factor authentication (I don't believe this is delivered with GRC).
    Regards
    Colleen

  • What is the difference between an End User ID and Deploy to ID?

    when installing my licenses i can see that i have an End User ID and a Deploy to ID, both having different numbers! please could you help me to understand the difference.

    I have n iMac 6.1 which I was led to believe was late 2008.
    Neil is correct, however to elaborate a 6.1 iMac is from late 2006, not 2008.

  • Report to see user type and roles assigned to users in EP?

    Hi,
    a) Is there any reporting mechanism in EP? Any specific report which throws up user types and roles assigned to the users? There is an option of 'Export' in the user management role but unfortunately it does not give information on User Type.
    b) If  the group is assigned a role, How can we see ( in any report) the roles assigned to a group? In the 'export' option of the 'User Management' this information does not come.

    By default Portal UME comes along with the installation of portal.
    Sometimes we may integrate external users using LDAP. At that time users come from ABAP stack or some active directories.  But you can also create users in the portal UME.  The purpose of using LDAP is to maintain the users centrally rather than creating again in portal.
    You can check them in user administration->identity management and search for the users.
    THere you can see some users will be from UME and some from LDAP.
    User Admin tool is nothing but User Administration only.
    Raghu

  • Is there Ready Made Configuration Packs available for Lync Client ( Client on end user computer ) and Server

    Hi,
    is there  Ready Made Configuration Packs available for Lync Client ( Client on end user computer ) and Server ... to check the configuration, services,compliance, functionality of all the features etc at end user level
    and server configuration packs
    Regards
    Tanoj
    OSLM ENGINEER - SCCM 2007 & 2012

    No, there is not something available for Lync. What's available can be found here (and it's all not recent):
    https://www.microsoft.com/en-us/search/DownloadsDrillInResults.aspx?q=SCCM+%22configuration+pack%22&cateorder=2_5_1&site=
    My Blog: http://www.petervanderwoude.nl/
    Follow me on twitter: pvanderwoude

  • MSS (non-webdynpro) Authorizations and Roles

    Do you know the MSS 60.1 business package authorizations and roles that are required for the backend R/3 system?  I noticed an SAP note exists for the webdynpro version (#798967) but didn't see a note for the old package.

    Umair,
    I know this auth object is required for webdynpros in new business package but does it apply for old traditional java MSS package too?
    Thanks, John

  • Regarding Authorizations and Roles

    Hi All,
    Can anyone explain me about Authorizations and Roles ,in detail.
    regards,
    Ali

    Links for Learning about Authorizations:
    http://help.sap.com/saphelp_nw70/helpdata/en/44/599b3c494d8e15e10000000a114084/frameset.htm
    http://help.sap.com/saphelp_bw33/helpdata/en/be/076f3b6c980c3be10000000a11402f/content.htm
    http://help.sap.com/bp_biv235/BI_EN/documentation/Authorization_BW_Proj.pdf
    http://help.sap.com/saphelp_nw04/helpdata/en/e3/e60138fede083de10000009b38f8cf/frameset.htm
    Links to learn about Roles:
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/1b439590-0201-0010-ea8e-cba686f21f06
    http://www.bwexpertonline.com/archive/Volume_04_(2006)/Issue_10_(Nov_and_Dec)/V4I10A2.cfm?session=
    Assign points if helpful,
    Venkat

  • Authorizations and roles

    Hi all!!
    Im creating an authorization object; for restrict some key figures of infocube.
    I want to restrict only four or five key figures for one cube and the user can see all the characteristics; is possible to do this??
    I found this way; but really is not that I want:
    I created an authorization object; that contains for example: 0material and Key fig.
    In transaction PFCG in the role; i go the authorization and include the object that I created and put the values * for material and the key figure that I want to see.
    But I want that the user can see all the chars; no necessarily 0material and hide some key figures.
    Thanks for the answer,
    Greetings,
    Monica

    Hi!!
    Thanks for the answer
    When I do this; and execute the query; I can see all the key figures; (they are in the area of columns) and for example I dont want to see one of them.
    Im not sure If Im doing something wrong.
    I followed this steps:
    1. I created in RSSM and authorization object with only 1KYFNM
    2. In PFCG I added to the role the object that I have created and put in the values of ratio; the ratios that I want to see.
    3. I actualizated the roles for the user.
    Then I executed the query and I see all the KF; I dont have any authorization variable in the query because I want that applied for all the chars.
    Thanks again,
    Mónica

  • Authorizations and role maintainance

    Please tell me that How are the authorizations in a role maintained?
    Thanks

    Hi,
    For Role and authorization Maintenance T.code is PFCG.
    1. Identify the users what kind of Role and authorization needs to be given,
    you can divide the role like PA , OM, TIME and Payoll.
    2. There are 2 kinds of role - a) Single Role and b) Composite Role.
    3. In the Role - give a name and click on create single role.
    then you will find differnt tabs - 1) description, 2) Menu,3)Authorization and user.
    You can define according to the requirement or you can copy from the standard role and assign to this.
    Thanks
    Sethu

  • Let end user request a role

    I want my end users to be able to request roles for themselves.
    Is there a out-of-the-box way to do this, or do I have to implement it myself?
    If I have to do it myself, please point me in the right direction.
    Thanks in advance
    Stefan

    Hi,
    Thnk u for u r quick reply.....
    i am using... IDM8.1
    I will Expain u the problem clearly...
    I created an ITRole(IT1) and assigned AD as optional resource.After tht i created Business role(B1) and assigened the ITRole(IT1) to tht roleB1.I assigned the B1 to the user . But i observed tht the resource(AD) is not Assigned to the user.So my question is how to assign the AD to tht user..one more surprising thing is the AD resource is not there in the user's available resources list also(End user and Admin interfaces).Am i doing anything wrong??
    Tnx in advance......
    Regards,
    Kavitha

  • End User Guide and Clone issues

    Hi,
    I am a newbie apps dba and would like to which docs/books to refer to know how the end user's work in EBS like how they place an order,etc.
    And also, I have done my clone a day back but the user's complain it is slow. I submitted a CP, it was completed successfully and it looks ok for me.
    Thanks.

    Hi Psn,
    I am a newbie apps dba and would like to which docs/books to refer to know how the end user's work in EBS like how they place an order,etc.
    Providing your EBS environment, will help us to provide better assistance on your questions as possible. There are so many Oracle's online documentation in learning Application products.
    Please refer the following:
    Oracle E-Business Suite Documentation
    I have done my clone a day back but the user's complain it is slow.
    - Check whether the Database Alert logfile, and application log files shows for any errros.
    - After cloning by default the sga target memory turns up to 1GB, ensure it is set accordingly.
    - Run an ADDM and see whether you have any database bottlenecks.
    Hope this Helps !
    Regards

  • Adobe Reader says I didn't accept end user agreement and won't let me open on Mac.

    "Before viewing PDF documents in this browser you must launch Adober Reader and accept the End User License Agreement, then Quit and relaunch the browser."
    I've tried to due this. No success. Any thoughts on how to go about fixing this?

    Similar issue, I can open documents that are on my mac but documents in safari I get the "Before viewing PDF documents in this browser you must launch Adobe Reader and accept the End User License Agreement, then Quit and relaunch the browser."  This is only since install of Yosemite.

  • CUP 5.3: Missing End User Personalization and others

    Upgraded from 5.2 to 5.3 SP06.  I'm expecting to see End User Personalization, User Review, and Change Long submenus in the Configuration tab, but they are missing.  I've imported the SP06 XML files for CUP, and configured the system to no avail.  I've opened up a support message, but was hoping that someone else has experienced this.

    Hi William
    Have you done all the steps related with POST upgrade steps in the installation document?
    also have you uploaded AE_init_append_data_CC.xml ?

  • HT3743 Apple end-user agreement and jailbreaking

    Hi, im not planning on jailbreaking but just wanted to understand where in the end user agreement does it state that jailbreaking voids the warranty?
    Thank you

    Not sure what country you are in or which device you have, but it is pretty much the same across the board. From the USA iPhone 5 warranty:
    http://www.apple.com/legal/warranty/products/iphone-english.html
    This Warranty does not apply: (a) to consumable parts, such as batteries or protective coatings that are designed to diminish over time, unless failure has occurred due to a defect in materials or workmanship; (b) to cosmetic damage, including but not limited to scratches, dents and broken plastic on ports; (c) to damage caused by use with another product; (d) to damage caused by accident, abuse, misuse, liquid contact, fire, earthquake or other external cause; (e) to damage caused by operating the Apple Product outside Apple’s published guidelines; (f) to damage caused by service (including upgrades and expansions) performed by anyone who is not a representative of Apple or an Apple Authorized Service Provider (“AASP”); (g) to an Apple Product that has been modified to alter functionality or capability without the written permission of Apple; (h) to defects caused by normal wear and tear or otherwise due to the normal aging of the Apple Product, or if any serial number has been removed or defaced from the Apple Product.

Maybe you are looking for