Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to restrict Table access in SAP?

Answer Posted / manoj

we can restrict table by using authorization objects :
1)S_TABU_DIS: restrict at authorization group level (ex:sa sc, &nc& etc)
2)S_TABU_NAM: restrict at table level(ex:usr40,usr01,agr_define etc)
@To check weather table belongs to which authorization group(goto table TTDAT(SE16/SE16N)....

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what are all the questions covered in "profiles related concepts " please let me know ?

2057


Can you explain snc in sap security?

1087


What is the difference between the table buffer and the user buffer?

1148


What are the uses of an authorization group?

1130


explain the personalization tab within a role?

1315


What is audit information system?

1087


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2402


Tell me about derived role?

1010


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1626


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2663


Can you explain protecting public keys?

1009


What are su56 t-codes used for?

1184


what is hypercare and go live support?

5286


What does the profile generator do?

1065


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2078