Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In su24, what will happen if i have maintain ' Do not check
' check indicator?(auth. check for auth. object is
maintained in program)

is that mean user can execute concern object function?

Answer Posted / sap

If we disable the check in SU24 check will not perform for
corresponding authorization objects. Also It will not pull
any data from SU24 after adding this role into any of the
roles. Correct me if i am wrong.

Is This Answer Correct ?    14 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain sap system transactions?

1187


How to codify for an Item in SAP? How many digits are required for an item?

2709


How can sap security be improved?

1175


How to insert missing authorization?

1207


how we do CUA configuration in Quality system

2485


What is sap cryptographic library?

1120


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4326


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2631


Explain document transfer-level security?

1182


how to do Reporting and Analysis authorizations

2533


What are su22 t-codes used for?

1196


How to find ECC system, GRC system and BI system ?

1275


what is user buffer?

1250


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2411


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7251