Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

1 .what are the authorization switches in security

Answer Posted / vikas srivastava

Authorization switches are used in HR security to activate
authorizaton check.
T-code OOAC is used to activate authorization check in HR
Some authorization switches are
Orgin,Orgxx,Pernr,Nnnnn,Appro,Adays,Orgpd..

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the main purpose of parameters, groups & personalization tabs?

1067


Can you explain network topology in sap systems?

1055


What are the most used tables in sap?

1161


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

2095


Attributes in SE01?

2489


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2285


what are the issues you faced with UME?

2977


What is the procedure for role modifications?

1113


How to assign any program to user?

1540


what is centralize FFID?

2030


What does the item category specify in a purchasing order in SAP Materials Management?

1330


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1082


how a t code works

2395


what is use of copy data in derived role and when we use this one ???

1729


You want to remove a developer's and developer keys from a system. How would you do that?

1046