cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Different steps involved in execution of a T-code.

RohitDhadekar45
Newcomer
0 Kudos
565
Whenever we execute a T-code the below sequence of steps will be executed.
 
1. The SAP will check whether the T-code is given by the user is valid or not using the table TSTC.
   If the T-code is valid then it will proceed to 2nd step otherwise SAP system will throw a message 
   saying that the T-code is not valid one.
 
2. In this step the system will check whether T-code has been locked or not.
   If the T-code is locked then the system will throw a error message saying that T-code is locked using
   SM01 T-code. If the T-code has not been locked then it will proceed to next step. 
 
3.In this step the system will check whether the user buffer contains all the authorizations for executing
  the T-code . If the user buffer contains the authorization then it will proceed to next step.
 
  Sometime even though the user having the corresponding role he is not executing the T-code in that cases we can go
  resetting the user buffer.
 
4. In this step the system will check whether the auth. object S_TCODE contains all the field value as a transaction.
   If the T-code is present then it is going to display the initial screen for the T-code.
 
5. Once we get the initial screen if we want to perform anything we need the corresponding authorization values in the user profile.

Accepted Solutions (0)

Answers (0)