Difference between S_tcode and Menu tab transactions?
Answers were Sorted based on User's Feedback
Answer / sree4grc
when add t-code in role menu,there will authorization check
will done in SU24 and T-Code relevent A.O,field values will
reflet in Profile Generator.
When u add T-Code in s_tcode a.o,there will no auth.check in
SU24,There is no field values reflected in PFCG.SO user is
not authorized to acess this particular T-Code.
Is This Answer Correct ? | 12 Yes | 4 No |
Answer / shankar
S_tcode--IT IS THE AUTHORIZATION OBJECT WHERE THE ALL
TRANGACTIONS ARE RESIDE HERE.
MENU TAB--WHERE WE ADDED ALL TRANZACTIONS HERE
Is This Answer Correct ? | 4 Yes | 3 No |
Answer / itsgaurav151
@ Karunakar : Yes user can access those t-codes if he/she have all chack objects maintained in Su24 along with appropriate values in his user buffer.
Is This Answer Correct ? | 1 Yes | 0 No |
User has access to the Tcode which was added manually in S_tcode but it will not show under menu tab
Is This Answer Correct ? | 1 Yes | 0 No |
How to run secatt in foreground?
How would you do the 'lock all users at once'.
If I just want to give any user authorization to create role but not to copy from any role so how can I do this ?
how many composite roles can be assigned to a user ?
Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
How to find the roles which are not contains profiles
1 Answers Cap Gemini, United Breweries UB,
different b/w Direct assigment and indirect role in bi security whn will go direct assignment
what is centralized n decentralized
In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
What is purpose of using Pound Sign(#) and colon(;) in BI/BW security
what all are the numbers of user types in system measurement?