Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the difference between User group in LOGON DATA tab
and user group in GROUPS tab in SU01 t code?

Answer Posted / satyajit

User Group for Authorization Check
If you assign a user to a user group for the authorization check on the Logon Data tab, you can distribute user maintenance tasks among several user administrators. The system administrator can assign the respective user administrator the right to create and change users in a group. Using the authorization object User Master Maintenance:User Groups ( S_USER_GRP), you can assign user groups to different administrators.

Users that are not assigned to any of the groups, can be maintained by all administrators.


General User Groups
You use the division of users into user groups on the Groups tab primarily to group users for mass maintenance (transaction SU10). Furthermore, the Global User Manager (transaction SUUM) uses the user groups.

In the user maintenance transaction (SU01), you can assign users to one or more groups on the Groups tab.

Maintaining User Groups
You create user groups using the function Environment -> User Groups -> Maintain. If you are using Central User Administration, you must create the user groups required in all systems.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How do we test security systems.

1117


Explain document transfer-level security?

1135


How to run the daily background job s for virsa violations ? thabks in advance

3659


What are the most used tables in sap?

1221


List the various user types.

1070


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2136


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2238


Which t-code can be used to delete old security audit logs?

1487


Why is it important to delete sap-new profile? What steps will you take to do this?

1135


what are the issues you faced with UME?

3065


Can you explain document transfer-level security?

1155


What appears as the last sentence in sap note 587410?

1059


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4265


what is authorization object and authorization object class?

1270


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1051