What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Answer Posted / mj

N = Do not check; X = Always check; Y = Check + USOBT entry
The flag indicates how the system is to deal with the
authorization object (new mode) for an authorization check.


Value 'N' Authorization object is not checked when the
transaction is called.

Value 'Y' Authorization object is checked when the
transaction is called. The values for the fields of the
authorization object must also be maintained in table USOBT
for the profile generator.

Value 'X' Authorization object is checked, but the field
values are not specified in table USOBT for the profile
generator.

Value (SPACE) A valid flag ('N', 'X', or 'Y') has not yet
been assigned to the authorization object.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What does user compare do?

690


What is Sap security t-codes?

722


Differentiate between derived role and composite role

663


how to do Reporting and Analysis authorizations

1906


You want to remove a developer's and developer keys from a system. How would you do that?

636






Explain internet-level security?

645


Explain document transfer-level security?

678


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1023


Tell me about derived role?

633


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1646


What are su25 t-codes used for?

702


What is the difference between role and a profile?

743


Which t-code can be used to delete old security audit logs?

902


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3056


Which tables will you use for making customizing setting for security administration?

712