what is the difference between su25 & su24 , when we can
make the authorization checks in su25 then what is the use
of su24
Answers were Sorted based on User's Feedback
Answer / itsgaurav151
T-code SU24 is used to select the check objects and default
values for an authorization when any t-code or report is added
to a role.
On the other hand t-code SU25 is used at the time of system
upgrade to perform below actions :
1) Initially fill the customer tables by copying from SAP tables.
2) Comparing the corresponding values between SAP tables and customer tables.
3) Find out which new t-codes are moved to Production system
during upgrade.
4) Find out all t-codes whose name has been changed in
upgrade, lets say ST03 is now called ST03N.
Is This Answer Correct ? | 11 Yes | 0 No |
what is the procedure for deleting a role?
what is sox and in sap security?
what is the main differene between roe and profile?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?
What is the main difference between single role and a derived role?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help
How can I do a mass delete of the roles without deleting the new roles?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
What is the difference between the table buffer and the user buffer?