SAP-SECURITY
Posted by
Admin at
Share this post:
|
0 Comments
Ush12 has change history for authorization values, and ush10 contains historical data for
authorization profiles. Ush02 and ush04 may also be analyzed. You may search on these
tables using se11, se16, or se17 to compare tables and generate your own data. They are
helpful for security forensics if you are trying to determine any possible questions on
users that had authority at a point in time
Keyword: BASIS
Title : SAP-SECURITY