Is it possible to use a multiply authorization objects to one infocube?

Hello!
BPS-BW implementation required to use security on several CHAR including hierarchies for one infocube. What the right way to implement this requirement?
I created (RSSM) several authorization objects: one per CHAR, and assigned it to infocube. Then I created a role and included the craeted objects. But cube data didn't display in a queries or planing folders. But, when I created the auth object for the required CHARs and assigned it to role the cube data displayed accordance setted values.
What's wrong?

Hi,
I think u have checked the check box for authorization relevant in the maintanance screen of chraracteristics ,thats the reason.
Regards-
Siddhu

Similar Messages

  • Restrict a t.code VK11 using Site as authorization object

    Hi all,
    We want to restrict VK11 t.code using Site as one of the authorizations. By default it has only Sales Org, Distr channel and division. I've added one more field for "Site" manually.
    We have defined specific values for Site in authorization objects. Still system does not restrict VK11 executed by  user as per site. It works with Sales org/Distr ch/Division. But it does not restrict Site-wise for that role.
    Please help.
    Regards,
    Ankush

    > I've never got past 'play dead' with such objects
    Yip, I know that feeling. It is like when you leave home for a long trip having packed everything you need, but you still have the feeling that you have forgotten something important behind and will kick yourself when you need it.
    > Can you please provide step by step instructions for that?
    There is no step-by-step procedure nor medication to take for it. You just have to wait for it to dawn on you...
    Enjoy the weekend and happy coding authority-checks,
    Julius
    ps: I heard that this feeling is also caused by the rising popularity of ABAP OO programming techniques, where the checks are often natively imbedded.

  • Possible to use 2 tnsnames.ora for just one client?

    Hi,
    in our organisation we have two different tnsnames.ora files. This because of the
    fact that there are remote locations each with their own IT department. Each department maitains their own databases, but applications are spread over the whole organisation.
    What I would like to to create is a tnsnames.ora in which there is an e.g. include c:\oracle\tnsnames.ora and include c:\oracle1\tnsnames.ore. Would that be possible?
    Fred

    If what you want to achieve is a situation where different users use the same PC, but you want to limit the tnsnames they have access to, what if you try setting the TNS_ADMIN environment variable to point to the permitted directory for each user env profile.
    e.g
    user1
    TNS_ADMIN=c:\oracle\network\admin\user1
    c:\oracle\network\admin\user1\tnsnames.ora
    c:\oracle\network\admin\user1\sqlnet.ora
    user2
    TNS_ADMIN=c:\oracle\network\admin\user2
    c:\oracle\network\admin\user2\tnsnames.ora
    c:\oracle\network\admin\user2\sqlnet.ora
    etc.

  • Is it possible to use Backup Assistant with the Kin One?

    I just got my new Kin One last night.  I've never used Backup Assistant before but I wanted to start now.  Unfortunately, the instructions for downloading the tool only seem to include phones with the "Get it Now" feature.  I can't find anything remotely like that in my phone's settings.  Am I overlooking it or does it simply not exist as an option for this phone?  I have a lot of contacts to enter and I hate to think that I'd have to do it all over again if something went wrong with the thing.
    Thanks in advance for any help that anyone can offer! 

    Sorry, Backup Assistant doesn't work with the Kin Onem. Some customers have had luck with getting a Verizon store to transfer them, but it seems to be hit or miss, as not every store has the software it needs for this particular device. Otherwise, consider this an opportunity to weed out old contacts as you enter them manually. 

  • Is it possible to use doGet() and doPost method in one jsp

    i am having a jsp form which will perform upload as well as download.There is a seperate servlet for download and upload.For downloading i use doGet method and doPost for the upload.how can i change the method dynamically for the above cases.

    Hi,
    in your jsp, if you call:
    request.getMethod();
    it should the string "GET" or "POST" depending on the HTTP method used, so you could do something like
    <%
    String httpMethod = request.getMethod();
    if ( "GET".equals(httpMethod) ) {
    // code to handle get requests
    else if ( "POST".equals(httpMethod) ) {
    // code to handle post requests
    %>
    I probably would of done it in a servlet(override doGet and doPost), or 2 seperate jsps
    Hope this helps
    Dominic

  • Is it possible to use Firefox Sync with more than one browser on a single phone?

    I have set up a New Sync account. I have logged in with my desktop Firefox (30a2) and with Firefox release on my Android phone. They seem to be syncing with each other. But with Aurora, it says "Could not sign in". I'm fairly sure I have the password right.
    How do I work out what's wrong or debug this?

    Yes this should work.
    Before new Sync there was a restriction, Release/Beta and Aurora/Nightly were considered one channel each. https://bugzilla.mozilla.org/show_bug.cgi?id=988437 removed this restriction.

  • Is it possible to use Adobe Illustrator in multiple computers with the same account?

    Hi guys,
    So our company is a small designing tile company,
    we wanted to purchase the Adobe Illustrator and was wondering if it was possible to use it in multiple computers with one account, as we have two computers that are frequently use for designing, or do we have to buy two separated Adobes Illustrators for each computer?
    Thanks

    From the End User License Agreement (EULA):
    2.1.3 Portable or Home Computer Use. Subject to the restrictions set forth in Section 2.1.4, the primary user of the Computer on which the Software is installed under Section 2.1 (“Primary User”) may install a second copy of the Software for his or her exclusive use on either a portable Computer or a Computer located at his or her home, provided that the Software on the portable or home Computer is not used at the same time as the Software on the primary Computer.
    So, while it CAN be installed on more than one computer, they may not both be in use at the same time.
    --OB

  • How to use CRM authorization object.

    Hi All,
    I have a specific requirement to restrict user while he/she tries to save a record. It appears that if that restrictions are implemented the save logic for an entity has to be changed because there are some validation regarding relationship management in SAP system. SO I need to bypass that validation to allow some users of specific(Marketting) role to save the entity record bypassing that validation. here I am planning to use the CRM authorization objects. But dont know how to use these and which authorization object to refer.
    Please let me know if you guys have any idea.
    Regards,
    Bikramjit.

    Hi Bikramjit.,
    You might need to create a Custom authorization object and then use it. Else you can create one Z table and maintain the User ID of all users. The mainatin one field with flag and set it to X for the user that are aloowed to save the transaction.
    Also once you maintain the table, generate the table maintenance so that it becomes easier for future use.
    Hope this helps

  • Use of RSSM to create authorization objects

    I have a few questions on the way of using authorization objects via RSSM.
    First, i would like to know if there is a limit in the number of values used as a filter in the authorisation object.
    First, what is the quantity limit of values that we can use as filter? CC00000010, CC00000011, CC00000012, ..., n. In this case what would be the value of n. In our fonctionnal need, ranges of values would not be an option.
    My second question is in relation with the use of an authorization object composed of two characteristics. Is there a way to build a case in witch the authorization check return a positive answer to a logical OR between the two  characteristics?
    Example 2, lets say that you want to perform an authority check on the cost center OR on the profit centre. Is there a way to build the authorization object to make sure that there is no error messages when the user has the authorization for the cost center CC00000010 OR the profit center PF00000011.
    Best regards,
    Stéphane Beaudoin

    why would you use Pages when there are templates in iweb
    as for the URL question, that is determined by the host, not iweb which just writes the page. but I would not use tinyurl since it has become a favorite of phishers and other web nasties. it might be worth getting a domain name if you can find a good deal.
    i would search for some realtor sites to see the kinds of information they are giving and how they are laying it out. and make sure that all photos look really really good. nothing is more off putting on a house ad than crappy photos

  • Is it possible to use multiple proxies simulatneously?

    I have access to four different proxy servers within my college. (Squid I think)
    Each proxy has limitations on the number of simultaneous GET requests (4 I think. When I set anything higher
    in Firefox images don't load, etc..) and allows only http and https traffic.  I was thinking if it was possible to use
    all/at least more than one proxy at a time to improve speeds.
    Does wget/aria2c have this capability? To download segments of a file from different proxies simultaneously instead of just one?
    I'd seen the manpages but as far as I can tell they use only one proxy server at a time (usually through environment variables)
    In fact I'd be happy if I were able to get good download speeds for pacman updates using multiple proxies.
    I've heard of network interface bonding but it looks like a lot of trouble to set it up (kernel recompilation! )
    Is http://www.cyberciti.biz/howto/question … -howto.php the way or is there any other?
    Just thought I'd know all possibilities before compiling kernels and stuff..

    I don't know if aria2 can use multiple proxies simultaneously, but if you want to download packages quickly through multiple proxies, you could do the following in a script:
    generate a metalink for your packages using powerpill
    split the metalink into separate metalinks with roughly the same download volume in each one
    launch separate instances of aria2c for each metalink, each set to a different proxy
    If you try this, don't forget to change the connection settings in the powerpill configuration file (or when you split the metalink) to avoid more than 4 connections per proxy.

  • Is it possible to use creative cloud in different regions?

    Is it possible to use creative cloud in more than one region. For example I live in Spain, but also spend a lot of time in the United States. Will it function even though every country has it's own pricing etc.
    Thanks

    YEs. Once installed the programs work just fine everywhere. The only issue may be with the sync stuff and other online features, since it will try to detect your region and give warnings or errors. Turning this stuff off might help.
    Mylenium

  • Can we reuse the Authorization objects in MM01 for  Custom TCODE  ZMM01

    Hi all,
    We need to create screens  or transaction code ZMM01 which will have all views in the form of a tab like sales data will have a tab to input sales information like plant data as its own tab to input plant specific data
    ceating material  masters  entries in Ztables like ZMARA,ZMARC,ZMVKE.
    Now my question is can we use the same authorization objects which are being used for standrard MM01 transaction code because same users who use MM01 will use ZMM01.
    If this is possible how can I know what are the authorization objects which I need to program for my ZMM01 Tcode.
    All replies are rewarded.
    Regards
    Martin.

    hi yes
    it is possible go to transaction SU21
    and search MM_G object class you can reuse the same for ur Z transaction
    also u will have to use SU22 to assing tcode to the obejct class
    Harish

  • Regardig Authorization object

    Hi All,
      I would like to know the step by step creation of authorization object...
      Iam able to create the authorization class and objects using SU21 for a ztable fields..
      And am not getting how to use this in ABAP program.
      I know using Authority-check we can do this...
      Here Iam not understanding to whom we are checking the authorization..and how...
      And also is this necessary to create a role in pfcg and assign it to user...
      if so what is the necessary to create a role...
      and what is the link between SU21 and pfcg...
      how this is affecting...
      can any one help me...out of this...
    thanks and regards
      raghu

    Hai Phani
    Go through this
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    go through report
    TABLES: TOBJT.
    DATA: OBJECT1 LIKE USR12-OBJCT,
    OBJECT2 LIKE USR12-OBJCT,
    OBJECT3 LIKE USR12-OBJCT,
    AUTH1 LIKE USR12-AUTH,
    AUTH2 LIKE USR12-AUTH,
    AUTH3 LIKE USR12-AUTH,
    IND LIKE SY-INDEX,
    FLAG TYPE I.
    DATA: BEGIN OF INTTAB OCCURS 30,
    OBJECT LIKE USR12-OBJCT,
    AUTH LIKE USR12-AUTH,
    END OF INTTAB.
    DATA: BEGIN OF INTTAB2 OCCURS 30,
    OBJECT LIKE USR12-OBJCT,
    AUTH LIKE USR12-AUTH,
    EXPL LIKE TOBJT-TTEXT,
    END OF INTTAB2.
    DATA: BEGIN OF TABSET OCCURS 30,
    SFIELD LIKE TOBJ-FIEL1,
    VON(18),
    BIS(18),
    END OF TABSET.
    *read up the authorizations from the user buffer
    CALL 'ANALYSE_USERBUFFER'
    ID 'AUTHS' FIELD INTTAB-SYS.
    *filter out the multipy authorizatios of the same object
    SORT INTTAB BY OBJECT.
    DO.
    IF SY-INDEX = 1.
    OBJECT1 = ''. AUTH1 = ''.
    READ TABLE INTTAB INDEX 1.
    OBJECT2 = INTTAB-OBJECT .AUTH2 = INTTAB-AUTH.
    READ TABLE INTTAB INDEX 2.
    OBJECT3 = INTTAB-OBJECT.AUTH3 = INTTAB-AUTH.
    ELSE.
    OBJECT1 = OBJECT2. AUTH1 = AUTH2.
    READ TABLE INTTAB INDEX SY-INDEX.
    OBJECT2 = INTTAB-OBJECT .AUTH2 = INTTAB-AUTH.
    IND = SY-INDEX + 1.
    READ TABLE INTTAB INDEX IND.
    IF SY-SUBRC = 0.
    OBJECT3 = INTTAB-OBJECT.AUTH3 = INTTAB-AUTH.
    ELSE.
    OBJECT3 = ''. AUTH3 = ''.
    IF OBJECT2 = OBJECT1 OR OBJECT2 = OBJECT3.
    INTTAB2-OBJECT = OBJECT2.
    INTTAB2-AUTH = AUTH2.
    SELECT SINGLE * FROM TOBJT
    WHERE LANGU = SY-LANGU
    AND OBJECT = OBJECT2.
    INTTAB2-EXPL = TOBJT-TTEXT.
    ENDIF.
    EXIT.
    ENDIF.
    ENDIF.
    IF OBJECT2 = OBJECT1 OR OBJECT2 = OBJECT3.
    INTTAB2-OBJECT = OBJECT2.
    INTTAB2-AUTH = AUTH2.
    SELECT SINGLE * FROM TOBJT
    WHERE LANGU = SY-LANGU
    AND OBJECT = OBJECT2.
    INTTAB2-EXPL = TOBJT-TTEXT.
    APPEND INTTAB2.
    ENDIF.
    ENDDO.
    SORT INTTAB2 BY OBJECT AUTH.
    *display the authorization and description, the objects, fields and
    *field values
    FLAG = 0. OBJECT1 = ''.
    LOOP AT INTTAB2.
    IF OBJECT1 = INTTAB2-OBJECT.
    WRITE: / INTTAB2-AUTH COLOR 2.
    PERFORM FIELD_VALUES.
    LOOP AT TABSET.
    WRITE: / TABSET-SFIELD, TABSET-VON, TABSET-BIS.
    ENDLOOP.
    ELSE.
    SKIP.
    WRITE: / INTTAB2-OBJECT COLOR 3, INTTAB2-EXPL COLOR 3.
    PERFORM FIELD_VALUES.
    WRITE: / INTTAB2-AUTH COLOR 2.
    LOOP AT TABSET.
    WRITE: / TABSET-SFIELD, TABSET-VON, TABSET-BIS.
    ENDLOOP.
    ENDIF.
    OBJECT1 = INTTAB2-OBJECT.
    ENDLOOP.
    FORM FIELD_VALUES *
    retrieve the field values of an authorization *
    FORM FIELD_VALUES.
    TABLES: USR12.
    FIELD-SYMBOLS .
    DATA: INTFLAG TYPE I VALUE 0, OFF TYPE I, VTYP, LNG TYPE I,
    CLNG(2), GLNG(2), FLDLNG TYPE I VALUE 10, SETFILL.
    SELECT SINGLE * FROM USR12
    WHERE AUTH = INTTAB2-AUTH
    AND OBJCT = INTTAB2-OBJECT
    AND AKTPS = 'A'.
    SETFILL = 0.
    REFRESH TABSET.
    CLEAR TABSET.
    OFF = 2.
    ASSIGN USR12-VALS+OFF(1) TO .
    WRITE TO VTYP.
    WHILE VTYP <> ' ' AND OFF < USR12-LNG.
    OFF = OFF + 1.
    CASE VTYP.
    WHEN 'F'.
    OFF = OFF + 5.
    ASSIGN USR12-VALS+OFF(2) TO .
    WRITE TO CLNG.
    LNG = CLNG.
    IF LNG <= 0.
    EXIT.
    ENDIF.
    OFF = OFF + 2.
    ASSIGN USR12-VALS+OFF(FLDLNG) TO .
    WRITE TO TABSET-SFIELD.
    OFF = OFF + FLDLNG.
    WHEN 'E'.
    ASSIGN USR12-VALS+OFF(LNG) TO .
    WRITE TO TABSET-VON.
    IF TABSET-VON = SPACE.
    TABSET-VON = ''' '''.
    ENDIF.
    APPEND TABSET.
    SETFILL = SETFILL + 1.
    TABSET-VON = SPACE.
    TABSET-BIS = SPACE.
    OFF = OFF + LNG.
    WHEN 'G'.
    ASSIGN USR12-VALS+OFF(2) TO .
    WRITE TO CLNG.
    GLNG = CLNG.
    OFF = OFF + 2.
    ASSIGN USR12-VALS+OFF(LNG) TO .
    IF INTFLAG = 0.
    WRITE TO TABSET-VON.
    WRITE '*' TO TABSET-VON+GLNG.
    ELSE.
    WRITE TO TABSET-BIS.
    WRITE '*' TO TABSET-BIS+GLNG.
    INTFLAG = 0.
    ENDIF.
    APPEND TABSET.
    SETFILL = SETFILL + 1.
    TABSET-VON = SPACE.
    TABSET-BIS = SPACE.
    OFF = OFF + LNG.
    WHEN 'V'.
    INTFLAG = 1.
    ASSIGN USR12-VALS+OFF(LNG) TO .
    WRITE TO TABSET-VON.
    IF TABSET-VON = SPACE.
    TABSET-VON = ''' '''.
    ENDIF.
    OFF = OFF + LNG.
    WHEN 'B'.
    INTFLAG = 0.
    ASSIGN USR12-VALS+OFF(LNG) TO .
    WRITE TO TABSET-BIS.
    IF TABSET-BIS = SPACE.
    TABSET-BIS = ''' '''.
    ENDIF.
    APPEND TABSET.
    SETFILL = SETFILL + 1.
    TABSET-VON = SPACE.
    TABSET-BIS = SPACE.
    OFF = OFF + LNG.
    ENDCASE.
    ASSIGN USR12-VALS+OFF(1) TO .
    WRITE TO VTYP.
    ENDWHILE.
    ENDFORM.
    go through this link
    http://www.thespot4sap.com/Articles/SAP_ABAP_Queries_Authorizations.asp
    also go through this Document
    AUTHORITY-CHECK OBJECT object
    ID name1 FIELD f1
    ID name2 FIELD f2
    ID name10 FIELD f10.
    Effect
    Explanation of IDs:
    object Field which contains the name of the object for which the authorization is to be checked.
    name1 ... Fields which contain the names of the name10 authorization fields defined in the object.
    f1 ... Fields which contain the values for which the f10 authorization is to be checked.
    AUTHORITY-CHECK checks for one object whether the user has an authorization that contains all values of f (see SAP authorization concept).
    You must specify all authorizations for an object and a also a value for each ID (or DUMMY ).
    The system checks the values for the ID s by AND-ing them together, i.e. all values must be part of an authorization assigned to the user.
    If a user has several authorizations for an object, the values are OR-ed together. This means that if the CHECK finds all the specified values in one authorization, the user can proceed. Only if none of the authorizations for a user contains all the required values is the user rejected.
    If the return code SY-SUBRC = 0, the user has the required authorization and may continue.
    The return code is modified to suit the different error scenarios. The return code values have the following meaning:
    4 User has no authorization in the SAP System for such an action. If necessary, change the user master record.
    8 Too many parameters (fields, values). Maximum allowed is 10.
    12 Specified object not maintained in the user master record.
    16 No profile entered in the user master record.
    24 The field names of the check call do not match those of an authorization. Either the authorization or the call is incorrect.
    28 Incorrect structure for user master record.
    32 Incorrect structure for user master record.
    36 Incorrect structure for user master record.
    If the return code value is 8 or possibly 24, inform the person responsible for the program. If the return code value is 4, 12, 15 or 24, consult your system administrator if you think you should have the relevant authorization. In the case of errors 28 to 36, contact SAP, since authorizations have probably been destroyed.
    Individual authorizations are assigned to users in their respective user profiles, i.e. they are grouped together in profiles which are stored in the user master record.
    Note
    Instead of ID name FIELD f , you can also write ID name DUMMY . This means that no check is performed for the field concerned.
    The check can only be performed on CHAR fields. All other field types result in 'unauthorized'.
    Example
    Check whether the user is authorized for a particular plant. In this case, the following authorization object applies:
    Table OBJ : Definition of authorization object
    M_EINF_WRK
    ACTVT
    WERKS
    Here, M_EINF_WRK is the object name, whilst ACTVT and WERKS are authorization fields. For example, a user with the authorizations
    M_EINF_WRK_BERECH1
    ACTVT 01-03
    WERKS 0001-0003 .
    can display and change plants within the Purchasing and Materials Management areas.
    Such a user would thus pass the checks
    AUTHORITY-CHECK OBJECT 'M_EINF_WRK'
    ID 'WERKS' FIELD '0002'
    ID 'ACTVT' FIELD '02'.
    AUTHORITY-CHECK OBJECT 'M_EINF_WRK'
    ID 'WERKS' DUMMY
    ID 'ACTVT' FIELD '01':
    but would fail the check
    AUTHORITY-CHECK OBJECT 'M_EINF_WRK'
    ID 'WERKS' FIELD '0005'
    ID 'ACTVT' FIELD '04'.
    Thanks & regards
    Sreenivasulu P

  • Authorization object with no authorization field

    Hi Experts,
    I have created authorization object with no field checking.
    This is possible? Because i want to create this auth object for conversion only, and its not needed field checking.
    Please advice.

    Hi
    See this and do accordingly
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a  profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    Regards
    Anji

  • Mass change of authorization objects in several roles

    Hello,
    we have to change a authorization object in almost 200 roles. Is there any possibility for mass change of authorization objects in several roles? We don't use the central SAP user administration.
    Best Regards
    Andreas Walter

    > at the moment all entries has the value "*". We want to change this value into "0001".
    Good!
    Here comes:
    1- download all relevant roles in once from PFCG. Make sure you use an appropriate codepage so you don't loose special characters in the role and menu texts.
    2- copy and backup the download file
    3- in the download file (is a text file)  look for all lines starting with AGR_1251 and conatining M_MATE_WGR and the field you want to change
    4- take out the star and two spaces and replace by 001. This file is a set of fixed record length table exports and keeping the original length is very important.
    5- upload the edited file and generate the profiles.
    As you may see this is not SAP standard and completely at your own risk. Best try in a sandbox client first.
    Good luck!
    Jurjen

Maybe you are looking for