{"id":136,"date":"2011-07-02T13:09:36","date_gmt":"2011-07-02T13:09:36","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=136"},"modified":"2015-05-03T09:04:11","modified_gmt":"2015-05-03T09:04:11","slug":"security-tcodes","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/security-tcodes\/","title":{"rendered":"Important SAP Security Transaction Codes"},"content":{"rendered":"<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong>Important SAP Security Transaction Codes<\/strong><\/span><br \/>\n<\/span><!--more--><br \/>\n<span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">These are the most Important SAP Security Transaction Codes which every SAP Security Consultant should be aware of.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><br \/>\n<\/span><\/p>\n<table class=\"easy-table-creator tablesorter\" style=\"width: 100%;\">\n<thead>\n<tr>\n<th>\n<h2><span style=\"color: #0000ff;\">Sl. No.<\/span><\/h2>\n<\/th>\n<th>\n<h2><span style=\"color: #0000ff;\">Transaction Code<\/span><\/h2>\n<\/th>\n<th>\n<h2><span style=\"color: #0000ff;\">Description<\/span><\/h2>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">1<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU01<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Create\/Change User<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">2<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU01d<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Display User<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">3<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU10<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Mass User Changes<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">4<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">PFCG<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Role Maintenance<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">5<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SUIM<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">User Information System<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">6<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU53<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Displays Last Authorization Check that Failed<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">7<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">ST01<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">System Trace<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">8<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU02<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">For Manual Creation of Profile<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">9<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU03<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">For Manual Creation of Authorization<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">10<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU3\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">For maintenance of address and parameters\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">11<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">PFUD\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">User Master Comparison\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">12<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SUPC\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Mass Generation of Profile\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">13<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU56\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Display User Buffer\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">14<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU24\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Maintain Check Indicator\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">15\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU25\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Fill USOBT_C and USOBX_C tables with SAP default values\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">16\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU20\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Create Authorization Field\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">17\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SU21\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Create Authorization Object\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">18\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SM19\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Configure Security Audit Log\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">19\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SM20\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">View Security Audit Log\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">20\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SUGR\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Maintain User Group\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">21\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">SMLG\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Maintain Logon Groups<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">22<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">STAD<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">Statistics display for all systems<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/h3>\n<\/td>\n<\/tr>\n<\/tfoot>\n<\/table>\n<p><script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><\/p>\n<h3><span style=\"color: #4c4c4c;\"><strong><!--more--><!--more--><\/strong><\/span><\/h3>\n<h3><span style=\"color: #e63518;\">You may want to have a look a<em>t <span style=\"text-decoration: underline;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/user-authentication\"><span style=\"color: #e63518; text-decoration: underline;\">User Authentication Process <\/span><\/a><\/span><\/em><\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/136"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=136"}],"version-history":[{"count":22,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/136\/revisions"}],"predecessor-version":[{"id":2128,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/136\/revisions\/2128"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}