Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q1)
What is an Authorization Group and when is it used? Explain
with example???

Answer Posted / aradhana

An authorization group contains tables and views with the
same security requirements
When you create or maintain a role, you assign an
authorization group to the role using the authorization
object S_PROGRAM (the authorization group is a field in
this authorization object).

You can create new roles or work on existing ones using
transaction PFCG.
Choose the Authorizations tab.
Under Maintain authorization data and generate profiles
click the Change authorization data button.
The system asks you to choose a template.

Choose the Manually button. The authorization object
contains the field Authorization group:ABAP/4 program (the
P_GROUP field). You can enter an authorization group for
the report and thus assign it to your role.

The authorization object also has a field ABAP/4 program:
user action (the P_ACTION field). Set this field to SUBMIT

Is This Answer Correct ?    5 Yes 10 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between role and a profile?

1302


How to do Role Design, Testing and Implementation

2513


Differentiate between derived role and composite role

1170


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1686


Support types of WOs you have faced?

2304


How we Educated client personnel in R/3 Security and general Basis knowledge

2276


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2341


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

2089


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2588


List the various user types.

1065


Attributes in SE01?

2547


could anyone tell me how we can copy the mass roles from sap_all profiles???????

2145


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1969


What is the use of tmssup* rfc destinations?

2612


What are the different types of sap security tables?

1109