Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi This is Prakash .

Can any one tell me what is the use of SU24 and SU25
transaction code exactly

Answer Posted / purushoth ak

Every Tcode has list of authorization objects which are
maintained in roles. when a Tcode is executed that objects
will refered in roles, if an object is not maintained in
role then it is an authorisation error which can be seen
through SU53 tcode. This list of maintianed auth. object
of Tcode can be checked through SU24.

Is This Answer Correct ?    14 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Differentiate between saml token profile and a sap logon ticket

1321


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2611


what is authorization object and authorization object class?

1195


what is the difference between usobt_c and usobx_c?

1294


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4404


Differentiate between derived role and composite role

1107


Tell me about derived role?

1010


how we can see FFID if firefighter not able to see FFids ?

1982


Can you explain network topology in sap systems?

1055


What is the difference between the table buffer and the user buffer?

1152


How to insert missing authorization?

1082


What profile versions?

1152


what is user buffer?

1118


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2285


How to run the daily background job s for virsa violations ? thabks in advance

3610