Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to identify which Authorization Objects contains which
fields \ activities?

Answer Posted / kishore

SE16 --> TACTZ -> Object --> give the Auth.Object name -->
Execute --> it will show the available activities.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are su53 t-codes used for?

1372


What are st01 t-codes used for?

1155


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1466


How to create users?

1225


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2445


Can you explain document transfer-level security?

1154


Is it possible to change role template? How?

1230


When would you update a sap table directly? What precautions would you taje?

1220


What authorization are required to create and maintain user master records?

1153


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1145


How to do Role Design, Testing and Implementation

2516


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2191


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3564


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4717


Explain network topology in sap systems?

1092