Unable to add or remove iView to role in user interface

Hi,
from last fews days, i am having problem with creation and deletion of ivIews on portal.
I created one iView and added it to the role which already had some iViews before... But the new iView i had added is not shown to user.. it shows me in content administrator that iView is been added..
  After which i had restarted my server...after restart it shown the iView to user...now i tried to add one more new iView..but still it shown me the same problem..
I am also unable to remove iView from portal.. i deleted the iView from content administrator..it shows the iView removed from role.... but on user interface this iView link is still seen in detail navigation..
although on clicking it does not show any content for the removed iView..but link is still present...
Hve any one faced this issue before...!!!
regards,
Jigar Oza.

Hi,
did u added the iviews as delta link or copy.
This sometimes happens if you add as direct copy intstead of delata link.
Delete the view and save. After that add as delta link and save.
This may solve your problem.
Raghu

Similar Messages

  • SCCM 2007 R2 - Rebooted DP since then unable to add or remove packages to DP

    Hi
    looking for some advice...
    Running Config Mgr 2007 R2
    Server 1 - SCCM Management Point
    Server 2 - SCCM Distribution Point
    Server 3 - SCCM Software Update Point
    Share - NetApp Share
    Rebooted the DP and when it came back up WDS wouldnt start. i removed PXE Service Point and removed WDS Role, re-installed WDS role and PXE Service Point. 
    WDS started ok since then i am unable to add/remove boot images to the distribution point stuck with Removal Retrying or Install retrying.
    Error Message ID - 2302
    distmgr.log - Cannot establish connection to ["Display=\\GRPSCCMDP01\"]MSWNET:["SMS_SITE=NEC"]\\GRPSCCMDP01\
    Any help will be much appreciated.
    Regards
    Matt

    Hi
    Thanks for replying
    yes
    Server 1 (GRPSCCMMP01) - SCCM Management Point is our Primary Site
    Server 2 (GRPSCCMDP01) - SCCM Distribution Point
    The NetApp Share is the Source Directory for our SCCM Packages.
    Basically Everything was working fine up until wednesday when our SQL DBA started to receive SQL errors:
    DESCRIPTION:   SSPI handshake failed with error code 0x8009030c, state 14 while establishing a connection with integrated security; the connection has been closed. Reason: AcceptSecurityContext
    failed. The Windows error code indicates the cause of failure.  [CLIENT: 10.130.17.72].
    followed by..
    Login failed. The login is from an untrusted domain and cannot be used with Windows authentication. [CLIENT: 10.130.17.72]
    I rebooted the Distribution Point Wednesday night to see if that would resolve the SQL errors. When I checked the server Thursday morning I noticed the WDS (Windows Deployment Service) was in a stopped state. I tried to start the service and it wouldn’t
    start.
    Rebooted server again – still the same
    Removed the PXE Service Point from the SCCM DP and removed the WDS role, rebooted server and then re-added them again.
    WDS successfully started.
    Since then we are unable to upload packages to the SCCM DP
    Error ID – 2302 - SMS Distribution Manager failed to process package.
    Packages are in a constant “install retrying” state.
    I have checked the distmgr.log and it states the following:
    Cannot establish connection to ["Display=\\GRPSCCMDP01\"]MSWNET:["SMS_SITE=NEC"]

  • Unable to add or remove safari bookmarks

    I have just upgraded from Maverick to Yosemite and using the current version of Safari. At some point when I was on Maverick, I noticed new bookmarks were not being saved and changes (deletions and moving bookmarks around) were not keeping. As soon as I close out of Safari and go back in to look at bookmarks, any change or add is gone; either the new bookmark is not there or the moved/deleted ones are retained in their old location. I thought Yosemite might fix this problem, but there appears to be no change.
    I've read that in some cases extensions may need to be turned off. I only have an Kaspersky extension but tried turning that off and it made no difference.
    Any help out there? I have a basic understanding of the Mac and don't know how to troubleshoot or correct this.
    Thanks!

    I do not know how to get to the ~/Library
    What happened when you followed the instructions in my last comment?
    Why do you suggest removing Kaspersky?
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the left side of the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Unable to add or remove widget in Today

    I cannot add or remove widgets in Today view of Notification Centre. It just showed a blank screen.
    Does anyone know how to solve this issue? Thanks!
    I have tried reset and restore from my backup, but it still got the problem.

    Then you won't like my response but it sounds like you need to restore the device as a new device. Then you can manually reinstall your apps and modify your settings to get the device back to where it was. Unfortunately you will not be able to save your text messages and voicemails. If you backed the device up with iTunes you can use a utility called iBackup Bot which will allow you to open the device's backup and extract messages and what not.

  • Removal and adding tabs in user interface

    Hi,can anybody provide me solution for customizing the user interface page menu tabs in SUN Identity Manager.
    My requirement is,i need to remove and add main menu and sub menus in the user interface page in SUN Identity Manager.
    Thanks in advance.
    Edited by: SUNIDMDEV on Feb 21, 2008 10:52 PM

    Hello,
    Article Master and Material Master are one and the same in context (materials are referred as Articles in SAP IS Retail). Please refer the below link for creating the custom fields/adding tab pages
    adding custom tab in material master transaction
    Hope this helps
    Regards
    Shiva

  • How to add a new Field to the WEB User Interface in CRM 2007

    Dear experts,
    I have been struggling to add a new field to the (CRM 2007) user interface from available fields for a specific view.
    I have maintained settings in BS__WD_CMPWBàRuntime Repository editoràComponentàViewàConfigurationàNew ConfigurationàAvailable FieldsàField Propertiesàand save.
    But the field is only appearing in display mode in the Web UI, which doesnu2019t allows any user input.
    I need your help to resolve the issue, I would be grateful if you could provide step-by-step documentation with screenshots or any other kind of documentation.
    Each suggestion will be appreciated.
    Best regards,
    Raghu ram.

    Hi Raghu Ram,
    I think you added a new custom field using some method like EEWB etc.,
    Then, you are adding the field onto the UI using UI Configuration Tool .. right ?
    These are the steps to diagnose:
    Method 1.Check the field properties in the model browser first.
      It should be showing 'C' i.e., CHANGEABLE. If it is showing as 'R', it is only READABLE.
      In such a case you need to find a BADI to change the field properties.
      For example, in Marketing Applications OBJ BADI has a method CHANGE FIELD PROPERTIES for this purpose.
    Method 2. Debug and check what is the value coming for RV_DISABLED parameter in the GET_I method in BSP_WD_CMPWB. This should be FALSE.
    Method 3. Check what are the field properties in the UI Configuration tool.
    Make sure it is not a display only field.
    Regards,
    Masood Imrani S.

  • Unable to add or remove items from dock

    First, sorry if this is a duplicate post - I did a number of searches and came up with lots of "frozen dock" and other bugs that weren't this one. There seemed to be pages and pages and after several I just gave up and posted myself.
    For the past few weeks I have noticed that I have been unable to remove any items from the dock. It is not that I get an error message when I try to remove them, they just don't budge.
    If an item is in the doc and the program is active, and I ctrl-click on the item - there is no longer a "Remove from dock" option.
    Further if a program is in the doc only because it is running and is not "always there", the ctrl-click will no longer give the "Keep in dock" option either.
    The lack of error message almost makes me think I have set some "feature" without realizing it - rather than encountering a bug.
    However, I would very much like it to go away anyway
    Anyone have any ideas?
    Any help would be greatly appreciated,
    Will
    Powerbook G4 15" Mac OS X (10.4.6)

    It sounds like you might have the 'contents-immutable' setting enabled on your "Dock". The only GUI available to an OS X client machine to adjust this setting is under "Parental Controls" in the "Accounts" pref pane - if your account is listed there as "managed", then it's possible that it may have become activated, in which case it should be possible to log out of the account, then in to an "admin" account and change the setting from there.
    Unlike "parental controls" which manage the "Dock" through 'mcx_settings', it is also possible to set the property directly in the "com.apple.dock.plist" file in the user's "~/Library/Preferences" folder. Usually this wouldn't be expected to happen by accident - third party software is often involved when hidden settings are suddenly found to have been enabled.
    If 'contents-immutable' has been set in the ".plist" file, one way to get rid of it is to move the "com.apple.dock.plist" file out of the "~/Library/preferences" folder, logging out and back in. The "Dock" will revert to default settings so it will be necessary to reconfigure it again. Alternatively, try opening "/Applications" > "Utilities" > "Terminal.app" and entering these commands:<pre>defaults delete com.apple.dock contents-immutable
    osascript -e 'tell application "Dock" to quit'</pre>

  • SAP AC 10 : ERM working fails (Unable to add Actions,permission)to new role

    Hello Gurus,
    We have done configuration for Role creation via ERM in SAP GRC AC 10.
    The configuration is done via BRF+ and MSMP ,when we try to create a new role via
    NWBC > ACCESS MANAGEMENT>Role Management -->Role Maintenance.
    We see that the correct "methodology" is selected which contains following steps
    Define Role --> Maintain Authorization -->Risk Analysis -->Request Approval -->generation.
    We go past 1st stage and when we are at Maintaining authorizations , the "edit" option is disabled
    It is not possible to add any Action (Tx), Permission(Objects) to the role.
    Is there something else that we need to configure or something that is missing ??
    Please suggest.
    Regards,
    Victor

    Hello All,
    This issue was resolved , after i maintained a User as "Role content approver" and "Assignment Approver"  Under "Owners/Approver" Of define role Tab.
    Whole cycle ran w/o any problem.
    Regards,
    Victor

  • I am unable to add or remove any icons on my iMac dock.

    Can anyone help me remove and/or remove icons from my iMac?

    You should just be able to drag the two question marks out of the Dock, then run each of the two new programs, which should show their icons in the Dock. (To keep them permanently in the Dock, select Options>Keep in Dock.) Can't do that? Can you say how you've been going about this.
    Message was edited by: WZZZ

  • Removing all the roles when user id is removed/set to expired

    Hi ,
    I have one requirement where , currently user is remove / expired correctly but the assosicated roles are still exist and gives problem in audit.
    need to write a program which will remove the roles associated with the user ID when it remove or expired ?
    pls guide.
    thanks

    Hi,
        Use BAPI BAPI_USER_PROFILES_DELETE.
    Regards,

  • Role Approver Actions-Add, Keep, Remove

    Currently, our role approvers were not able to modify the action of (ADD, KEEP, REMOVE).  This fields was greyed out and it was passed in by IDM as ADD or REMOVE depending on what the user selected.  We just implemented SP12 for CUP. We noticed that under Workflow>Stage>Change Request Content if this is set yo YES then the approver has the ability to do perform these functions below.  1 & 2 are ok.  We reject roles at the role level on the request.  However, we want to disable the ability for the role approver to modify ADD, REMOVE, KEEP  on #3.  
    1.  Approver can reject
    2.  Approver can modify the Valid State Date and Valid To Dates
    3.  Approver can modify the action and change it to KEEP or REMOVE.  We wnat to disable this drop-down selection.
    We noticed that if we Workflow>Stage>Change Request Content and change the value to No then the role approver can no longer reject the role.
    Does anyone know how to disable this functionality so that role approvers cannot change the action on the request?

    SAP confirmed  that there is no way turn this feature off if the approver needs to reject at the role level so this will be a process change we need to implement most likley.  However, it would appear that with the Add Role feature turned on there is a new button called Existing Roles/Groups that is displayed.  Approver can now view the roles assigned in the SAP ABAP back-end without adding new roles which is very nice that it is display only.  Thank you for your quick response to my question.
    New question:  Do you know if there is a web service that is used to call this new feature Existing Roles/Groups.  We would like to utilize that for our IDM system to call a web service and display this on the request form.

  • Unable to add Hyper v role in windows 2012

    Hi,
    I am unable to add hyper v role in windows 2012.
    Error - 
    The request to add or remove feature on the specified server failed.Installation of one or more roles,role services,or features failed. Feature name Microsoft-Hyper-V-Offline is unknown. Error: 0x800f0900
    Need help

    Hi,
    Before going further, would you please provide more information about your current environment? Do you mean you installed the two Windows Server 2012 on VMware workstation? If so, have you
    enabled hardware virtualization on Vmware workstation?
    Enable Hardware virtualization in VMware Workstation 8
    http://vmwaremine.com/2012/02/03/enable-hardware-virtualization-in-vmware-workstation-8/#sthash.ZSp4ZTHQ.dpuf
    In addition, please also refer to the following thread to see if it works.
    Fail to add Hyper-V Role on Windows 2012 Datacenter R2
    http://social.technet.microsoft.com/Forums/en-US/c543d84d-1be9-4cdc-943f-f626729e12c3/fail-to-add-hyperv-role-on-windows-2012-datacenter-r2?forum=winserverhyperv
    Best Regards,
    Andy Qi
    Andy Qi
    TechNet Community Support

  • Unable to add/remove users in Mountain Lion Server (Options are greyed out)

    For some reason, im unable to add/remove users in Mountain Lion server. The + and - are greyed out. It seems like something is wrong with the permissons because it looks like it cant write the the Ldav3 file (although that may be speculation). Does anyone have any advice for me? I URGENTLY need to add users.
    Maybe theres a way to restore default permssions for the boot drive (if that in fact is the issue). Hopefully there is a way that I can fix this while leaving all users, groups, their permissions and shares intact.

    Anything interesting and relevent in the server logs?
    Anything interesting in the server alerts?
    Since it's far and away the most common cause of problems with OS X Server and with distributed authentication (Open Directory is entirely based on network encryption and digital certificates and on responses from your local DNS server(s)), verify your local DNS configuration is working and requires no changes with the following Terminal.app (Applications > Utilities) harmless, diagnostic command:
    sudo changeip -checkhostname
    sudo requires an administrative password.  You might get a one-time warning about the sudo, and that can safely be ignored.  The command will display some details, and indicate whether the local configuration appears valid and no changes are required, or further diagnostics for (most) common errors that can arise.

  • How to add iview to role using webdynpro

    Hi every one, Can you please tell me how to add iview to role using webdynpro code.
    Thanks
    TK

    Hi,
    could you copy / past your code ?
    if you need help on webdynpro and your beginner, try to watch the video on internet of WebBProfessor. It's really good videos !
    regards
    Fred

  • Unable to delete Role from User ID in SAP SOLMAN production system but able to from DEV with the same authorization, pls suggest

    unable to delete Role from User ID in SAP SOLMAN production system but able to from DEV with the same authorization, pls suggest

    Hi,
    For SU01 role removal, you do not need S_USER_AGR with 02, and as you mentioned both authorizations available in production, if so trace should not show you the S_USER_AGR with 02 with RC=04.
    I would recommend to do role comparison for the user performing the activity. and then check if you have the S_USER_AGR with 02 in user buffer SU56.
    But ideally it should not ask you S_USER_AGR for 02 through SU01, so please take help of abaper to debug it.
    Also put trace in non-prd to see if S_USER_AGR is getting checked with 02 for removal through SU01.
    BR,
    Mangesh

Maybe you are looking for