What is the impact of changing the SU24 objects for a t-
code Check ndicator from "No" to "Yes" and "Yes" to "No" ?
Answer Posted / mj
N = Do not check; X = Always check; Y = Check + USOBT entry
The flag indicates how the system is to deal with the
authorization object (new mode) for an authorization check.
Value 'N' Authorization object is not checked when the
transaction is called.
Value 'Y' Authorization object is checked when the
transaction is called. The values for the fields of the
authorization object must also be maintained in table USOBT
for the profile generator.
Value 'X' Authorization object is checked, but the field
values are not specified in table USOBT for the profile
generator.
Value (SPACE) A valid flag ('N', 'X', or 'Y') has not yet
been assigned to the authorization object.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
how we can see FFID if firefighter not able to see FFids ?
How to run the daily background job s for virsa violations ? thabks in advance
what is user base in sap security?
what is the use of defaults tab in start menu
What are su25 t-codes used for?
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What is the use of Personalization tab in SU01?
what is your ticketing tool? can we give some details about how we are getting tickets
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Can you explain secure store and forward?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Explain protecting public keys?
Which t-code can be used to delete old security audit logs?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar