Hi This is Prakash .
Can any one tell me what is the use of SU24 and SU25
transaction code exactly
Answer Posted / syed mahboob feroz ahmed
Hi,
SU24 deals with many factors for Object Class,when a role
is created and a object class is being transferred it will
proceed with Authorization as follows:
Changed,Maintained,Unmaintained,Manually.
1)Changed is when Auth is changed.
2)Maintained is when orgfields and Auth is Maintained.
3)UnMaintained is when when there is no Auth.
4)Manually is when we manually change Auth or Org Fields to
0.
| Is This Answer Correct ? | 2 Yes | 7 No |
Post New Answer View All Answers
How to find ECC system, GRC system and BI system ?
What is Sap security t-codes?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is the difference between c (check) and u (unmaintained)?
Which t-code can be used to delete old security audit logs?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
what is sod in sap security?
What is sap’s grc?
Which tables will you use for making customizing setting for security administration?
Tell me about derived role?
Authorization check on s_btch_job failed. What would happen now?
How to do Role Design, Testing and Implementation
what is centralize FFID?
What happens to change documents when they are transported to the production system?