Hi This is Prakash .
Can any one tell me what is the use of SU24 and SU25
transaction code exactly
Answer Posted / utsav mukherjee
SU25 copies SAP default values from the tables :USOBT &
USOBX to customer tables: USOBT_C and USOBX_C.
Please Note: [USOBT: It consists of transactions and
authorisation objects with SAP default Authorization
values.
USOBX: It defines the necessary authorisation
checks within a transaction.]
SU24 maintains the assignment of authorisation objects in
the customer tables USOBT_C and USOBX_C.
Please Note: [USOBT & USOBX are not coming into picture in
case of SU24]
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
List the various user types.
You want to create and maintain user master record. What authorization would you need?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What authorization are required to create and maintain user master records?
Can you explain network topology in sap systems?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
how we do CUA configuration in Quality system
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What are the most used tables in sap?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
When would you update a sap table directly?
Authorization check on s_btch_job failed. What would happen now?
Any details about secatt apart from SAPSecurity online.com?
Explain internet-level security?