If you are a SAP Security consultant, then the most widely used transaction would be SUIM (User Information System). It provides a complete package of tools which helps us with our daily authorization issues and tasks.
Technical details:
Package: SUSR_IS / SUSR (old version)
Selection Screen: 1000
Program: RSUSRSUIM
Start with variant: NA
Authorization Object: No object is checked at the start of transaction
GUI Support:
SAPGUI for HTML | YES |
SAPGUI for Java | YES |
SAPGUI for Windows | YES |
Application Component: BC-SEC-USR-IS
Object directory entry: R3TR TRAN SUIM
Related Programs:
Program Name | Description |
RSUSR002 | Users by Complex Selection Criteria |
RSUSR003 | Check the Passwords of Standard Users in All Clients |
RSUSR006 | Locked Users and Users with Incorrect Logons |
RSUSR008_009_NEW | Users or Roles with Combinations of Critical Authorizations |
RSUSR010 | Executable Transactions ( All Selection Options ) |
RSUSR020 | Profiles by Complex Selection Criteria |
RSUSR030 | Authorizations by Complex Selection Criteria |
RSUSR040 | Authorization Objects by Complex Selection Criteria |
RSUSR050 | Comparisons |
RSUSR070 | Roles by Complex Selection Criteria |
RSUSR200 | List of Users According to Logon Date and Password Change |
RSUSRCUA | Display Change Documents for the CUA Landscape |
Related Tables:
Table name | Description |
NA | NA |
Related Views:
View Name | View Description |
NA | NA |
Related Transactions:
Transaction Name | Description |
RSUSR_ROLE_MENU | Search for Applications in Role Menu |
SE16_AGR_DEFINE | Technical View for AGR_DEFINE |
RSUSRAUTH | Single Roles with Authorization Data |
Screenshot: