Menus in LXDE, only root user has them

So I go through "Beginner's Guide" and get to the part about "Choose and install a graphical interface".
I want LXDE so I try to follow directions in wiki article for "LXDE",
installing group lxde and other items as they are suggested.
Now
as root user I can start LXDE by issuing from command line
xinit /usr/bin/startlxde
and I get LXDE running OK with menus populated with the few applications I have so far.
Problem:
As a non-root user, I start LXDE by issuing from command line
xinit /usr/bin/startlxde
but the only menu items I get are "Run" (which does nothing) and "Log Out" with does offer me a log-out window.
I suspect a file exists somewhere that root user can find and use
but
non-root user either cannot find it or doesn't have sufficient permissions.
Ideas? Advice?
Thanks.
Last edited by llsyblanket (2012-09-09 03:11:24)

We need more information. How much of the wiki did you do? Did you do this part?
After the installation finishes, copy three files to ~/.config/openbox as instructed by pacman:
Place menu.xml, rc.xml and autostart in ~/.config/openbox
They can be found in /etc/xdg/openbox
As the user of interest
mkdir -p ~/.config/openbox
cp /etc/xdg/openbox/menu.xml /etc/xdg/openbox/rc.xml /etc/xdg/openbox/autostart ~/.config/openbox
Did you do this part?
If not using a display manager you would like to add
export DESKTOP_SESSION=LXDE
to your ~/.bash_profile in order xdg-open to function properly.
Do you have a .xinitrc file in your user/home directory?
To start LXDE from the command line without a ~/.xinitrc:
$ xinit /usr/bin/startlxde
If ~/.xinitrc already exists this will not work.
Last edited by 2ManyDogs (2012-09-09 03:12:14)

Similar Messages

  • Only root user can run GDM

    I'm attempting to move from lxde to gnome. I installed the gnome package, and ran "sudo systemctl disable lxdm", "sudo systemct enable gdm", and rebooted, but during the boot it froze after starting the gdm. After rebooting a couple of times, I switched tty and tried to start it manually, but it tells me that "only the root user can run GDM", so I'm assuming that's the problem. Does anyone know what I can do?
    EDIT: Booting to lxdm works fine
    Fafner
    Last edited by fafner (2013-11-29 00:26:24)

    #!/bin/sh
    # ~/.xinitrc
    # Executed by startx (run your window manager from here)
    if [ -d /etc/X11/xinit/xinitrc.d ]; then
      for f in /etc/X11/xinit/xinitrc.d/*; do
        [ -x "$f" ] && . "$f"
      done
      unset f
    fi
    xset s off
    exec gnome-session
    # exec startkde
    # exec startxfce4
    # ...or the Window Manager of your choice
    I hadn't touched the .xinitrc file until now. I tried with the "exec gnome-session"-line commented out as well, with the same result
    Last edited by fafner (2013-11-29 00:38:24)

  • Only root user can login, Please help

    Hi all, Iam new to solaris.
    I installed solaris 10 and configured SSH service.
    only root can login to console throught GUI let it be JDE or CDE while other users can't.
    Other users can only login through SSH or through command line prompt( before the GUI starts).
    Please help.
    Thanks.

    Well, the GUI read/writes a lot of configuration files and otherfiles in your HOME directory, if it failes doing so the different services which makes the GUI fails to function and it will exit.
    The users can probably login through the GUI even if they don't have a proper $HOME if they choose the Option->Session->Failsafe session.
    7/M.

  • Only one user has the site coming up as insecure how do we fix this?

    Our company webpage is coming up with the shield and displays with no graphics. We can allow it to display manually by clicking on the shield, but then when Firefox is restarted it is back to not displaying again. . We have checked all of the settings and cannot find anything to "white list" the site. I would think that if it was going to do this for one person it would do it for everyone? The computer is a Dell laptop running Windows 7 Enterprise with Firefox 33.0.3. He does not have this issue with IE 10.

    Separate Issue; Update your
    Flash Player '''v15.0.0.189 http://get.adobe.com/flashplayer/'''
    Shockwave Director '''v12.1.3.153 http://get.adobe.com/shockwave/'''
    Go to the web page. Once the page is loading, mouse to the address bar
    and '''Left''' click the icon. A window for displaying site information should
    come up. Select '''More Information.''' Now select '''Permissions.''' In the
    menu, find and check the plugins, make sure they are set properly.

  • Cannot set admin right to my user root account has STANDARD RIGHTS!

    I had this common problem, my account turned to standard.
    I followed the instructions here.
    I changed the root password from the install DVD, restarted.
    logged in as "root", but the root user has standard rights as well!!
    therefore I cannot change the rights of my user...
    any suggestions?

    Wow, it looks like you went for the deluxe bugs package.
    ..."now I'm the adminstrator. but this didn't change the fact, that folder I'm creating ( doesn't matter where ) have "read only" rights for the admin. system has read write....
    You hadn't mentioned that before, but actually that sounds like a completely different problem, one that can be caused by using "repair permissions" on a 10.5 volume while booted from a 10.4 (or earlier) disk - this might also include having used "DiskWarrior" to repair permissions (something the manufacturer advises against). Unfortunately, Apple is in the process of revising how "repair permissions" works, and the new method in 10.5 doesn't appear to be fully implemented. As a result, it does not fix this problem, which is purely a permissions issue. If this is indeed the problem, the most straightforward way to get back to a normal system is to reinstall - an "archive and install" while preserving network and user settings should be sufficient for this particular issue. If you are comfortable with the command line, it may be possible to change permissions manually - it would be necessary to attempt a permissions "repair" or "verify" under Leopard, and to record and carefully analyze the messages to determine what needs to be fixed, and how.
    The "Finder" crashes are due to another bug - the GUI crashes when there are files or folders with a group ID that doesn't correspond to a group record in "DirectoryService". There are various strategies to use as workarounds: if all of the problem files have the same group ID, it is probably fastest just to create a group record for that group. If there are a number of different groups involved, doing a batch change of group from the command line might be easier. To get an ideal of what groups are involved, the following command can be used to display the various factors regulating access to a particular file or folder - try using it to survey a selection of different items exhibiting the problem:<pre>
    ls -elO /path/to/item</pre>
    Copying the items to an external drive, then copying them back to a folder that does not display "(unknown)" in "Get Info" might be another strategy (but note that there have been some reports of data loss copying large amounts of data - even after the 10.5.1 update, and even copying instead of moving). Ultimately, these are just workarounds and Apple really needs to fix this sooner than later - it's getting stupid.
    But actually, considering all of the different issues you are experiencing, backing up the data to an external drive (and verifying the integrity of the backup), then performing a full "erase and install" might be the one stop solution. I'm not sure about the best strategy for reimporting the data once that is done since I have never used the Apple tools and do not know how they handle ownership and permissions (what is perserved, etc.) - hopefully someone else will be able to fill in those details.
    So you were bitten by the "Get Info" crash bug, a second issue caused directly by following what turned out to be bad advice in an official kb article, and had a permissions problem that couldn't be resolved using the tool that is supposed to deal with permissions problem. I'd call that a Leopard beta hat trick.

  • How do I log in as root user.

    Adobe Acrobat Pro fix requires logging in as root user.  Instruction link only refers to OS X Lion and before, which does not work in Yosemite.

    Rednik55,,
    Important: If you are not familiar with the meaning of "root user," read this entire article to learn important precautionary information before using the root user. You must have an administrator account and password to complete the steps below.
    About the root user
    The user named "root" is a special user in UNIX-style operating systems that has read and write privileges to all areas of the file system. The root user should only be used for specific administration or monitoring tasks. After completing a task as the root user, you should log out of Mac OS X and log back in using a normal or administrator account. You should disable root access if you do not use it often.
    The root user does not appear in Users or Accounts preferences.
    Important notes
    Only the owner of a computer or its designated administrator(s) should have an administrator account or the root password.
    Any user with an administrator account can become the root user or reset the root password.
    A root password should be difficult to guess, containing both numbers and letters within the first eight characters.
    A root user has the ability to access other users' files.
    The root user has the ability to relocate or remove required system files and to introduce new files in locations that are protected from other users.
    How to Enable the root user
    From the Apple menu choose System Preferences....
    From the View menu choose Users & Groups.
    Click the lock and authenticate as an administrator account.
    Click Login Options....
    Click the "Edit..." or "Join..." button at the bottom right.
    Click the "Open Directory Utility..." button.
    Click the lock in the Directory Utility window.
    Enter an administrator account name and password, then click OK.
    Choose Enable Root User from the Edit menu.
    Enter the root password you wish to use in both the Password and Verify fields, then click OK.
    How to Login as the root user
    If you are logged in, choose Log Out from the Apple menu.
    If you are logging in from a list of usernames with pictures, click Other.
    In the Name field, type: root
    In the Password field, type the password you defined in the steps above.
    How to disable the root user
    From the Apple menu choose System Preferences....
    From the View menu choose Users & Groups.
    Click on the lock and authenticate with an administrator account.
    Click Login Options....
    Click the "Edit..." or "Join..." button at the bottom right
    Click the "Open Directory Utility..." button.
    Click the lock in the Directory Utility window.
    Enter an administrator account name and password, then click OK.
    Choose Disable Root User from the Edit menu.
    Please be careful as the Root user. Once you are done make sure you disable it.
    Supporting Article,
    http://support.apple.com/en-us/HT1528
    Hope that helps,
    Weston

  • IdM 8.1: Problems to provision Solaris 10 with non root user.

    Hello
    When IdM 8.1 tries to create a user into Solaris 10 I got this Error:
    com.waveset.util.WavesetException: An error occurred adding user 'testSolaris' to resource 'Test_Solaris'. com.waveset.util.WavesetException: Script failed waiting for "_,)#(:" in response "> > > > > > > > > > > pbmasterd3.5.4-01: 5408.07 select: Bad file number [email protected]: 3005 Request en...roblem in readMuxHeader fd 1. - fd closed unexpectedly [email protected]: 3005 Request ended unexpectedly " com.waveset.util.WavesetException: Script processor timed out with nothing to read and the following unprocessed text: "> > > > > > > > > > > pbmasterd3.5.4-01: 5408.07 select: Bad file number [email protected]: 3005 Request ended unexpectedly pbmasterd3.5.4-01@pbr9c: 5430.1 header problem in readMuxHeader fd 1. - fd closed unexpectedly [email protected]: 3005 Request ended unexpectedly pbmasterd3.5.4-01@pbr9c: 5430.1 header problem in readMuxHeader fd 1. - fd closed unexpectedly [email protected]: 3005 Request ended unexpectedly pbmasterd3.5.4-01@pbr9c: 5430.1 header problem in readMuxHeader fd 1. - fd closed unexpectedly [email protected]: 3005 Request ended unexpectedly ".+
    *The non root user has the privileges that describes the IdM documentation. This error doesn't occure when the connection user is root.*
    *What's wrong?*

    The non - root doesn't work yet. I try to use a user with SUDO = TRUE but I got this error when I Test the connection:
    Script failed waiting for "ASSWORD:" in response "_,)#+(:" ==> com.waveset.util.WavesetException: Script processor timed out with nothing to read and the following unprocessed text: "++_,)#+(:".+
    I haver already configured the parameter tty_tickets to TRUE and the sudoers file as following:
    +# sudoers file.+
    +#+
    +# This file MUST be edited with the 'visudo' command as root.+
    +#+
    +# See the sudoers man page for the details on how to write a sudoers file.+
    +#+
    ++Defaults syslog=auth+
    Defaults:idm_sudo       tty_tickets
    root    ALL=(ALL) ALL
    idm_sudo  ALL = NOPASSWD: /usr/bin/auths,/usr/sbin/groupadd,/usr/sbin/groupdel,/usr/sbin/groupmod,/usr/bin/last,/usr/bin/listusers,/usr/bin/logins,/usr/bin/passwd,/usr/bin/profiles,
    +/usr/bin/roles,/usr/sbin/useradd,/usr/sbin/userdel,/usr/sbin/usermod,/usr/bin/awk,/usr/bin/cat,/usr/bin/chmod,/usr/bin/chown,/usr/bin/cp,/usr/bin/cut,/usr/bin/diff,/usr/bin/echo,+
    +/usr/bin/grep,/usr/bin/ls,/usr/bin/mv,/usr/bin/rm,/usr/bin/sed,/usr/bin/sleep,/usr/bin/sort,/usr/bin/tail,/usr/bin/touch,/usr/bin/which+
    What's wrong?

  • [SOLVED]Xorg won't work for my non root user

    I installed Arch Linux 2009.08 x86_64 Core inside Sun VirtualBox 3.0.8 and got up to the part of the Beginners' Guide that tells me to test X and it can never work for my non root user. Funny thing is, I tried running it as root and it worked even though my root user has no ~/.xinitrc file. Running startx or xinitrc as my non root user I get a small (maybe 400x600) white terminal but can't use my mouse or keyboard.
    After looking over the guide and doing a step I forgot and adding in all of the extra stuff the guide says might help I can use my mouse and keyboard in my non root users' small white terminal but X still won't start properly with xterm even though I put 'exec exterm' in my non root users' ~/.xinitrc file. Please help. Thanks for any help guys.
    Last edited by keiichi (2009-10-23 12:34:50)

    schuay wrote:
    keiichi wrote:After looking over the guide and doing a step I forgot and adding in all of the extra stuff the guide says might help I can use my mouse and keyboard in my non root users' small white terminal....
    I don't get it .. this sounds like xterm is starting up successfully (xterm is a small white terminal). Easiest way to get X up and running (imo) is
    sudo pacman -S gnome gdm xorg xf86-input-evdev
    sudo /etc/rc.d/hal start
    sudo /etc/rc.d/gdm start
    I didn't know that's what xterm was, thanks for telling me. Noob mistake.

  • Display characterstics value only if user populates respcetive variable

    Hi Friends,
    I have a strange situation wherein I have to show results according to characteristics only if user has populated respecitve var. for ex, i have cal year and cal month in query. If user only populates cal year than cal month should not be dispalyed in output and if user populates cal month then cal year shoudlnt be dispalyed in output.
    any help is welcome,
    thx,
    purvang

    Hi,
    write CMOD code for the two variable in i_step = 2 .
    using flag option which will be set if any of the variable value is entered. SO based on it value other value will be blank.
    Hope it helps,
    Uday.

  • When sharing photos between two users, if one user uploads new photos, only he can view them. Any help on this issue?

    My iPhoto library is in Shared Folders so both users can access and edit the pictures. However, if one users uploads new photos, for some reason these become only available to him and the other user cannot even view them.
    All permissions have been set so that both users have them on the shared folders. For some reason, when creating a folder, the permissions are not kept....
    Please help.

    The same thing has started happening to us since upgrading to iPhoto 11 and Lion. If I import photos from my camera, then my partner can see thumbnails of those photo, but cannot click them to see them sull size. Similarly if my partner imports photos.
    We have used a shared iPhoto library stored in Users/Shared/Photos for several years and everything has been fine until now.
    I am backing up now and will then check and repair the library permissions. I'll post back the results.

  • Only root has access to internet in OEL5

    I've installed OEL5 and I've done the configuration to access the internet.
    The problem is that only root has access to internet.
    If I'm logged in with another user, I have to launch Firefox as root, to access the internet.
    Why?

    Yes, I have to say some details.
    I am connected to the internet in one of the Oracle offices. OEL5 is installed on a vmWare machine that runs on Windows XP.
    If I connect to X as root, everything works fine.
    If I connect to X as a normal user, in Mozilla I have access only to Oracle intranet, but not to the internet. For example if I type oracle.com, it works, but google.com doesn't work.
    As a normal user, if I type "su - root" then "mozilla" in the terminal, I have access to the internet too, so google.com works fine.

  • I have a FAT 32 External Hard Drive marked as Read Only that is unchangeable by an administrator or root user, how can I make it read/Write

    Hello, All,
    I have a FAT 32 External Hard Drive marked as Read Only that is unchangeable by an administrator or root user, how can I make it read/Write without reformatting it ? 

    Hi Kappy,
    Just wondering if you had any advice for my situation . . .
    My time machine backup was backing up to a drive that was "Mac OS X Enteded Journaled, Case Sensitive."  I had no idea what this meant, or that it would even cause issues.
    I took my computer to the Apple store yesterday, and they wiped it clean.  When they tried to restore it from the Time Machine backup drive, it would not work.  Their guess is that Time Machine cannot restore from a drive that is "case sensitive."
    Any thoughts on how I can convert my time machine backup data from a "case sensitive" state, to a "non-case sensitive" state?  I've tried to just drag and drop the files from the case sensitive formatted drive to a new drive that I have that is formatted non case sensitive, but I get the following error message:
    "The volume has the wrong case sensitivity for a backup"
    I just really want my data back - I thought TimeMachine was the way to go (and was supposed to work) but unfortunately it is not.
    Any help you can provide would be greatly appreciated.
    Thanks,

  • If a User has select only on a table, it isn't listed in TABLES

    I have a group of Users I want to be able to access a view of the table (select only).
    I created a role and table/select privs. for those users. In SQL Developer they
    do not see a list under TABLES for those tables they have SELECT Access to.
    They can, however, enter a query (if they know the name) and select from the table,
    but they have to know the table name and they are not listed.
    Is there an Oracle priv. a user must have to have to view the TABLES (although they
    only have select)?

    Yes, I would think so. But for all the tables listed, when you click on the DATA tab you do not see any data. The only way to view is to go the SQL Worksheet and query *
    from the table.
    The user has SELECT on the tables.

  • TS1368 Cannot connect to/open application to ITune.  Message states "because another user has it open.  Ask them to quit and retry."  However, there is no other user.  Help!

    Cannot connect to/open application to ITune.  Messages states that it cannot open "because another user has it open.  Ask them to quite and retry."  However there is no other user???  Thanks for any help.

    You Windows must have different user profile where iTunes is open in that profile.  Switch windows user and close the iTunes, then return to your own user profile to open again.

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

Maybe you are looking for

  • Error is "Report Contents No data

     error is "Report Contents No data

  • 11.1.2.3 install issue

    I have just installed 11.1.2.3 Foundation only (so far) and have run through the configuration of SS and deployment to the app server.  I am able to start the WebLogic domain and access the WL admin console, but I'm unable to start any of the EPM win

  • Sequence settings for gopro

    what is the best sequence setting for a gopro hero 2 ?

  • Quality level

    Hi, We are migrating QM related master data from 4.6C to ECC6. We have loaded inspection plan. Please let me know the importatnt fields that we have to check in inspection plan. When we try to load quality level, it gives an error stating inspection

  • R3 to PI Acknowledgement

    Hi The scenario I have is to perform a Goods issue for an outbound delivery posted by PI in R3, originating from a third party system. I need to send back to the 3rd party the result of the Goods Issue attempt, processed or rejected, and if rejected,