Do you have any question about this t-code?
Transaction Code: JJL2
Description: IS-M: Standard Access Analyze Pages
Release: ECC 6 only
Program: SAPMMCSC
Screen: 100
Authorization Object: M_CUST_MCS
Development Package:
Package Description:
Parent Package:
Module/Component:
Description:
Overview: The SAP transaction code JJL2 is used to analyze the standard access of an object in the SAP system. It is part of the Information System (IS) module and is used to check the authorization of a user or group of users to access a particular object. Functionality: The JJL2 transaction code allows users to analyze the standard access of an object in the SAP system. It provides a detailed overview of the authorization of a user or group of users to access a particular object. It also allows users to check the authorization profiles assigned to a user or group of users, as well as any additional authorization objects that may be required for access. Step-by-step How to Use: 1. Enter the transaction code JJL2 in the command field. 2. Select the object type for which you want to analyze the standard access. 3. Enter the name of the object for which you want to analyze the standard access. 4. Select the user or group of users for which you want to analyze the standard access. 5. Select “Display” to view the authorization profiles assigned to the user or group of users, as well as any additional authorization objects that may be required for access. 6. Select “Change” if you need to make any changes to the authorization profiles or additional authorization objects assigned to a user or group of users. 7. Select “Save” if you need to save any changes made in step 6. 8. Select “Back” if you need to go back and make any changes in step 5 or 6, or if you are done and want to exit out of the transaction code JJL2. Other Recommendations: It is recommended that users familiarize themselves with all aspects of using transaction code JJL2 before attempting to use it in their SAP system, as it can be complex and time-consuming if not used correctly. Additionally, it is important that users ensure that they have all necessary authorization profiles and additional authorization objects assigned before attempting to use this transaction code, as it will not work without them.