SAP Basis Web Development - SAP Basis

Direkt zum Seiteninhalt
Web Development
Offline / Online ReDO Logs
The analysis shows you in the form of a traffic light output (red-yellow-green) whether the respective settings are configured correctly. In addition, you can also view the detailed values of the respective settings.

Permissions beyond the daily task spectrum are granted only for limited periods and under control. The activities with the emergency user are logged in a revision-proof manner. Do you already have an emergency user concept in use or would like to introduce one? I'm happy if you share your experience with me! You can leave me a comment or contact me by e-mail.
Documentation and training
For these cases, you should take a closer look at the DBACOCKPIT transaction. This transaction provides you with many other database management features, an editor that allows you to easily execute your SQL queries against your SAP system. This method displays the result in the GUI shortly after the query is sent. How to execute a SQL query To call the editor for SQL queries in DBACOCKPIT, the user must: The user needs corresponding rights to execute the transactions SM49 and SM69. STOR and SMSS must be cultivated in the S_ADMI_FCD permission object. SQL queries must maintain the database connection. To get the current status of a database connection, see the DBCONT table. Rights for calling the table(s) to be retrieved must be assigned. For more details, see the section "Further information on DBACOCKPIT" in this blog post.

In the result table USERTCODE are the transaction codes of the SAP users. Afterwards you simply have to output the complete list via "Object > Output complete list". Then save the list via "System > List > Save > Local file". The column Account contains the SAP user. This way you can see the used transactions grouped by SAP user.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

The support package must then be fully reloaded.

You can also select the various filters (2), activate the filters individually (3), specify clients and users (4) and specify which activities are logged (5).
Zurück zum Seiteninhalt