Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Answer Posted / mj

N = Do not check; X = Always check; Y = Check + USOBT entry
The flag indicates how the system is to deal with the
authorization object (new mode) for an authorization check.


Value 'N' Authorization object is not checked when the
transaction is called.

Value 'Y' Authorization object is checked when the
transaction is called. The values for the fields of the
authorization object must also be maintained in table USOBT
for the profile generator.

Value 'X' Authorization object is checked, but the field
values are not specified in table USOBT for the profile
generator.

Value (SPACE) A valid flag ('N', 'X', or 'Y') has not yet
been assigned to the authorization object.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what are the issues you faced with UME?

2977


Any details about secatt apart from SAPSecurity online.com?

2264


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2761


what is the main difference between the derived role and a single role?

1090


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4151


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2130


what is the process to find that one consultant had removed a table from sap tables

2490


Explain snc in sap security?

1127


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2186


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2236


What are st01 t-codes used for?

1110


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

1019


Explain secure store and forward?

1079


What is stad?

1111


How can sap security be improved?

1053