Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi This is Prakash .

Can any one tell me what is the use of SU24 and SU25
transaction code exactly

Answer Posted / purushoth ak

Every Tcode has list of authorization objects which are
maintained in roles. when a Tcode is executed that objects
will refered in roles, if an object is not maintained in
role then it is an authorisation error which can be seen
through SU53 tcode. This list of maintianed auth. object
of Tcode can be checked through SU24.

Is This Answer Correct ?    14 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2722


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1074


Can you explain protecting public keys?

1065


What does user compare do?

1201


Can you explain document transfer-level security?

1146


Can wildcards be used in authorizations?

1201


How we schedule and administering background jobs?

1127


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2234


Can you explain secure store and forward?

1054


You want to remove a developer's and developer keys from a system. How would you do that?

1100


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2338


how a t code works

2448


What does the pfcg_time_dependency clean up?

1261


Which transaction should not be given to BASIS and DEV team in Production?

2513


Explain protecting public keys?

1268