Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Difference between S_tcode and Menu tab transactions?

Answer Posted / itsgaurav151

@ Karunakar : Yes user can access those t-codes if he/she have all chack objects maintained in Su24 along with appropriate values in his user buffer.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2410


How we Educated client personnel in R/3 Security and general Basis knowledge

2331


Authorization check on s_btch_job failed. What would happen now?

1259


what is your ticketing tool? can we give some details about how we are getting tickets

1662


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2488


How to update risk id in rule set?

1225


What is sap cryptographic library?

1119


What does the item category specify in a purchasing order in SAP Materials Management?

1435


How to do Role Design, Testing and Implementation

2575


What are su22 t-codes used for?

1196


What does the profile generator do?

1176


what is the difference between usobt_c and usobx_c?

1405


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4771


What are se10 t-codes used for?

1182


Can you explain document transfer-level security?

1205