Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?

Answer Posted / sky fly

No -> yes
changed auth. objects 'are now included in the affected
roles.if any field does not have a value in the role, then
authority check for the user will fail.
Yes -> No
changed auth. objects are now removed from the affected
roles. there will be no failure of authority check.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Attributes in SE01?

2543


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2343


What are some ap security t codes?

1164


how you can delete multiple roles from qa, dev and production system?

1299


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2329


Explain protecting public keys?

1265


what are the issues you faced with UME?

3063


how to do Reporting and Analysis authorizations

2461


What is the use of Personalization tab in SU01?

5682


User is not there in User master record. Then how to trace the user?

1470


Which t-code can be used to delete old security audit logs?

1482


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1048


what is sod in sap security?

1228


Can you explain document transfer-level security?

1140


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2287