Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to restrict a newly created program ?

Answer Posted / shankarreddy08

We can restrict with the help of Auth.Group(field values:P_Group for Programmes) and this Auth.Group is assigned under the S_Develop and S_programme(optional).

S_develop-> Helps to develop teh programmes.
S_Programme-> Used to execute the programme either in Forground /background

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are su25 t-codes used for?

1291


What does the item category specify in a purchasing requisition in SAP Materials Management?

1580


What is the difference between c (check) and u (unmaintained)?

1951


How we Educated client personnel in R/3 Security and general Basis knowledge

2331


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2383


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2631


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2200


You want to remove a developer's and developer keys from a system. How would you do that?

1145


What is the difference between authorization object and authorization object class?

1181


how we can see FFID if firefighter not able to see FFids ?

2095


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1243


What is a composite role?

1553


How do you check background jobs?

1233


What are the uses of an authorization group?

1255


what is the main difference between the derived role and a single role?

1203