Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the difference between se16 and se16n ?

Answer Posted / eformigoni

Mr. Prabhu explain a complete list of the difeerences , I
want only add the following information:
It is possible to find all changes executed by transaction
SE16N on the following tables:
SE16N_CD_KEY -> Table Display: Change Documents – Header
SE16N_CD_DATA - > Table Display: Change Documents – Data

There is a new security note that block the function
&SAp_edit

note CO-OM tools: SE16N: Deactivating &SAP_EDIT

Is This Answer Correct ?    3 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are su56 t-codes used for?

1263


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2361


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1486


What is the use of tmssup* rfc destinations?

2619


Which t-code can be used to delete old security audit logs?

1497


Explain secure store and forward?

1203


how a t code works

2457


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1083


When would you update a sap table directly?

1092


What are pfud t-codes used for?

1266


Explain transport system-level security?

1176


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2671


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2348


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2147


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1196