Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi This is Prakash .

Can any one tell me what is the use of SU24 and SU25
transaction code exactly

Answer Posted / utsav mukherjee

SU25 copies SAP default values from the tables :USOBT &
USOBX to customer tables: USOBT_C and USOBX_C.

Please Note: [USOBT: It consists of transactions and
authorisation objects with SAP default Authorization
values.
USOBX: It defines the necessary authorisation
checks within a transaction.]


SU24 maintains the assignment of authorisation objects in
the customer tables USOBT_C and USOBX_C.

Please Note: [USOBT & USOBX are not coming into picture in
case of SU24]

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to do Role Design, Testing and Implementation

2525


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1196


how a t code works

2456


Can you explain network topology in sap systems?

1126


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

1386


Explain transport system-level security?

1176


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2732


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2094


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2361


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2249


Can you explain snc in sap security?

1177


What is sap cryptographic library?

1081


What are pfud t-codes used for?

1265


User is not there in User master record. Then how to trace the user?

1479


Can you explain document transfer-level security?

1156