Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In su24, what will happen if i have maintain ' Do not check
' check indicator?(auth. check for auth. object is
maintained in program)

is that mean user can execute concern object function?

Answer Posted / krishna

This question can be split into multiple scenarios:
1. If the object us added in SU24 and check is de-activated, then the object will not be pulled into the role, however since there is code, it will sure check the Authorization for the new object. Any thing in SAP is through code, hence if the code is checking then the user should have this auth. object in his buffer otherwise system will not allow.
2. Add this object manually in the role and maintain, then this will overcome the SU24 changes, but this is not the right approach, still we can overcome.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What profile versions?

1240


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1411


Can you explain secure store and forward?

1117


How to do Role Design, Testing and Implementation

2575


Explain document transfer-level security?

1182


What are the different types of sap security tables?

1155


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2200


Pfcg proposed activities but you need only two. What would you do?

1188


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2395


What are se10 t-codes used for?

1184


Can you explain sap system transactions?

1187


Explain protecting public keys?

1342


User is not there in User master record. Then how to trace the user?

1514


What is the maximum number of profiles in a role and maximum number of object in a role?

1075


How can sap security be improved?

1175