What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
Answer Posted / mj
N = Do not check; X = Always check; Y = Check + USOBT entry
The flag indicates how the system is to deal with the
authorization object (new mode) for an authorization check.
Value 'N' Authorization object is not checked when the
transaction is called.
Value 'Y' Authorization object is checked when the
transaction is called. The values for the fields of the
authorization object must also be maintained in table USOBT
for the profile generator.
Value 'X' Authorization object is checked, but the field
values are not specified in table USOBT for the profile
generator.
Value (SPACE) A valid flag ('N', 'X', or 'Y') has not yet
been assigned to the authorization object.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What does user compare do?
What is Sap security t-codes?
Differentiate between derived role and composite role
how to do Reporting and Analysis authorizations
You want to remove a developer's and developer keys from a system. How would you do that?
Explain internet-level security?
Explain document transfer-level security?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Tell me about derived role?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What are su25 t-codes used for?
What is the difference between role and a profile?
Which t-code can be used to delete old security audit logs?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Which tables will you use for making customizing setting for security administration?