Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi This is Prakash .

Can any one tell me what is the use of SU24 and SU25
transaction code exactly

Answer Posted / purushoth ak

Every Tcode has list of authorization objects which are
maintained in roles. when a Tcode is executed that objects
will refered in roles, if an object is not maintained in
role then it is an authorisation error which can be seen
through SU53 tcode. This list of maintianed auth. object
of Tcode can be checked through SU24.

Is This Answer Correct ?    14 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which tables will you use for making customizing setting for security administration?

1231


explain the personalization tab within a role?

1436


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4259


what is centralize FFID?

2152


what are the issues you faced with UME?

3126


Can you explain internet-level security?

1193


Can wildcards be used in authorizations?

1268


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4326


what things you have to take care before executing run system trace?

1317


What are pfud t-codes used for?

1331


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2411


How to codify for an Item in SAP? How many digits are required for an item?

2710


What is Sap security t-codes?

1268


Can you explain secure store and forward?

1118


You want to remove a developer's and developer keys from a system. How would you do that?

1145