Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi This is Prakash .

Can any one tell me what is the use of SU24 and SU25
transaction code exactly

Answer Posted / syed mahboob feroz ahmed

Hi,
SU24 deals with many factors for Object Class,when a role
is created and a object class is being transferred it will
proceed with Authorization as follows:
Changed,Maintained,Unmaintained,Manually.
1)Changed is when Auth is changed.
2)Maintained is when orgfields and Auth is Maintained.
3)UnMaintained is when when there is no Auth.
4)Manually is when we manually change Auth or Org Fields to
0.

Is This Answer Correct ?    2 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to assign any program to user?

1532


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2088


what is centralize FFID?

2028


You want to remove a developer's and developer keys from a system. How would you do that?

1042


What are su25 t-codes used for?

1177


what is authorization object and authorization object class?

1192


What does the item category specify in a purchasing requisition in SAP Materials Management?

1467


How can I do a mass delete of the roles without deleting the new roles?

1382


As a SAP security consultant what is the most challenged you faced in previous company?

1049


What is stad?

1107


What is sap cryptographic library?

1019


What are the uses of an authorization group?

1129


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1441


What is the difference between role and a profile?

1214


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2402