What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
Answer Posted / gaurav s
Thanks Ruchika, the above quoted answer is in scope of my
knowledge. But i am looking for the technical process which
skips the auth-check for an object which is marked Yes from
No in Auth Check column in su24.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
User is not there in User master record. Then how to trace the user?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
What is a composite role?
what things you have to take care before executing run system trace?
What are pfud t-codes used for?
Explain snc in sap security?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Explain internet-level security?
Explain x-glueb and its use in sap security.
What does the profile generator do?
What is Sap security t-codes?