Have you ever experienced a situation where the management of a business area requests which users have access to a certain transaction? If done wrong, it can become hard work. One way we can do this analysis quickly and effectively is through the T-Code transaction: SUIM.