What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
Answer Posted / sky fly
No -> yes
changed auth. objects 'are now included in the affected
roles.if any field does not have a value in the role, then
authority check for the user will fail.
Yes -> No
changed auth. objects are now removed from the affected
roles. there will be no failure of authority check.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Can you explain transport system-level security?
Can you explain protecting public keys?
What is the difference between the table buffer and the user buffer?
What are su22 t-codes used for?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
What does the pfcg_time_dependency clean up?
What are su56 t-codes used for?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
User is not there in User master record. Then how to trace the user?
Explain network topology in sap systems?
Authorization check on s_btch_job failed. What would happen now?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
How to find ECC system, GRC system and BI system ?