Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In su24, what will happen if i have maintain ' Do not check
' check indicator?(auth. check for auth. object is
maintained in program)

is that mean user can execute concern object function?

Answer Posted / prasad manne

Check - Yes >> authorization check will be performed and object is pulled when transaction is added to some role.
Check - No >> authorization check will be performed and object is not pulled when transaction is added to some role.
Do not chek >> authorization check will not be performed

Is This Answer Correct ?    11 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3554


how to do Reporting and Analysis authorizations

2457


when performing client copies what steps you need to take from CUA point of view?

2556


what is your ticketing tool? can we give some details about how we are getting tickets

1600


You want to create and maintain user master record. What authorization would you need?

1178


what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1475


How to run the daily background job s for virsa violations ? thabks in advance

3650


how a t code works

2441


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2145


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1967


Explain protecting public keys?

1264


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2285


You want to remove a developer's and developer keys from a system. How would you do that?

1094


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2336


what is the critical issue u are faced in your previous experience

1935