Identify critical basic permissions
Background/Value
Certain basic authorizations or authorization combinations lead to risky overauthorizations. The ARM analysis and display options provide you with the optimal tool for finding critical authorizations.
Related features
Identify multiple authorizations for transaction codes
Step-by-step process
Use the search to find a critical basic authorization.
ARM opens the SAP authorization structure and focuses on the entry you are looking for. Browse through the subordinate structure to analyze the use of the critical basic authorization.