Hi This is Prakash .
Can any one tell me what is the use of SU24 and SU25
transaction code exactly
Answer Posted / syed mahboob feroz ahmed
Hi,
SU24 deals with many factors for Object Class,when a role
is created and a object class is being transferred it will
proceed with Authorization as follows:
Changed,Maintained,Unmaintained,Manually.
1)Changed is when Auth is changed.
2)Maintained is when orgfields and Auth is Maintained.
3)UnMaintained is when when there is no Auth.
4)Manually is when we manually change Auth or Org Fields to
0.
Is This Answer Correct ? | 2 Yes | 7 No |
Post New Answer View All Answers
Which t-code can be used to delete old security audit logs?
what is your ticketing tool? can we give some details about how we are getting tickets
How do we test security systems.
What are some ap security t codes?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What does the item category specify in a purchasing requisition in SAP Materials Management?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Attributes in SE01?
How to find ECC system, GRC system and BI system ?
What are the uses of an authorization group?
what is the use of defaults tab in start menu
By which parameter number of entries are controlled in the user buffer?
What is a composite role?