Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In su24, what will happen if i have maintain ' Do not check
' check indicator?(auth. check for auth. object is
maintained in program)

is that mean user can execute concern object function?

Answer Posted / krishna

This question can be split into multiple scenarios:
1. If the object us added in SU24 and check is de-activated, then the object will not be pulled into the role, however since there is code, it will sure check the Authorization for the new object. Any thing in SAP is through code, hence if the code is checking then the user should have this auth. object in his buffer otherwise system will not allow.
2. Add this object manually in the role and maintain, then this will overcome the SU24 changes, but this is not the right approach, still we can overcome.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

As a SAP security consultant what is the most challenged you faced in previous company?

1097


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2713


what is sod in sap security?

1226


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

2084


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2645


Which tables will you use for making customizing setting for security administration?

1152


Can you explain secure store and forward?

1049


when performing client copies what steps you need to take from CUA point of view?

2556


How to codify for an Item in SAP? How many digits are required for an item?

2653


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1321


what are the issues you faced with UME?

3061


What is the main purpose of parameters, groups & personalization tabs?

1116


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2183


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4453


How we schedule and administering background jobs?

1123