Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Q1)
What is an Authorization Group and when is it used? Explain
with example???

Answer Posted / aradhana

An authorization group contains tables and views with the
same security requirements
When you create or maintain a role, you assign an
authorization group to the role using the authorization
object S_PROGRAM (the authorization group is a field in
this authorization object).

You can create new roles or work on existing ones using
transaction PFCG.
Choose the Authorizations tab.
Under Maintain authorization data and generate profiles
click the Change authorization data button.
The system asks you to choose a template.

Choose the Manually button. The authorization object
contains the field Authorization group:ABAP/4 program (the
P_GROUP field). You can enter an authorization group for
the report and thus assign it to your role.

The authorization object also has a field ABAP/4 program:
user action (the P_ACTION field). Set this field to SUBMIT

Is This Answer Correct ?    5 Yes 10 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1072


what is hypercare and go live support?

5332


What is the difference between usobx_c and usobt_c?

1072


Explain secure store and forward?

1170


How we Educated client personnel in R/3 Security and general Basis knowledge

2270


What is use of derived roles?

1246


What does the profile generator do?

1122


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4455


Can you explain protecting public keys?

1063


How to assign any program to user?

1607


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1048


What authorization is required to create and maintain user master records?

1103


what things you have to take care before executing run system trace?

1248


What is the procedure for role modifications?

1172


Attributes in SE01?

2543