Hi This is Prakash .

Can any one tell me what is the use of SU24 and SU25
transaction code exactly

Answer Posted / parthu

SU25 will be used in 2 phases. 1 is at implementation and 2 is at Upgrade Phase.

At Implementation Phase we need to do some customizations according to Customers Business Requirements.

TCode: SU22 Will Contain Predefined configuration Tables (Default tables provided by SAP) USOBX & USOBT and We can not modify them at SU22 level. So, in order to achieve this we use SU25 to copy the tables USOBX & USOBT.

In SU25 Screen, Select 1st option (Initially Fill The Customer Tables). So it will copy from "USOBX to USOBX_C" and from "USOBT to USOBT_C"

"C" stands for Customization and SU25 is one time job (at implementation phase only)

2nd PHASE(UPGRADE): At Up-gradation Phase, In SU25 Tcode We select 2A,2B,2C,2D options.

Coming to TCode SU24, Once we copy USOBT and USOBX from SU22 (with the help of SU25). SU24 will contain USOBT_C and USOBX_C tables (Customization Tables) where we are going to customize the Authorization Objects , Fields & Field Values as per the requirements of CUSTOMER.

USOBX_C will contain Check indicators and USOBT_C will contain T.codes, Filed & Values.

Is This Answer Correct ?    12 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which transaction code is used to display the user buffer?

676


What is the difference between role and a profile?

740


Is it possible to change role template? How?

684


Explain transport system-level security?

649


How we schedule and administering background jobs?

662






What are su25 t-codes used for?

700


how to do Reporting and Analysis authorizations

1903


what is the different b/w su10 and su12

2184


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

1832


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

677


what things you have to take care before executing run system trace?

748


Explain document transfer-level security?

675


What are su56 t-codes used for?

689


Explain internet-level security?

645


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2011