Identify critical basic permissions
Certain basic authorizations or authorization combinations lead to risky overauthorizations. The ARM analysis and display options provide you with the optimal tool for finding critical authorizations.
Identify multiple authorizations for transaction codes
Use the search to find a critical basic authorization.
ARM opens the SAP authorization structure and focuses on the entry you are looking for. Browse through the subordinate structure to analyze the use of the critical basic authorization.