SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
HTTP://SAPSECURITY.WORDPRESS.COM/




                                        SU24
                                     Job Aid for SU24

                                               Jays
                                            11/28/2010




Purpose: Transaction SU24 maintains the USOBT_C and USOBX_C tables. These tables hold
the relationships between the particular transaction and its authorization objects. It is possible to
add or subtract the checks performed in the transaction by changing the appropriate flag.
         The addition (check or check/maintain) flag of an authority-check only works if SAP had
provided the authorization object as standard in the calling program. Do not expect the system to
perform an authority-check automatically when an object is added in the list of other objects for a
particular transaction code because the calling program will have no knowledge of these objects.
The subtraction (or no check) of an authority-check is possible to all transaction and all objects
except HR and BASIS related authorization objects.
         The benefit of transaction SU24 occurs when transactions are added or deleted from
Role Groups using the Profile Generator. When deleting transaction the Profile Generator will
remove all authorization values that were needed for that transaction. When new transactions are
added, the Profile Generator will add all authorization values needed to run the transaction(s).
The addition or removal of authorization values is based upon values entered in SU24.
Section A. Check/Maintain Authorization Values
This section will explain the steps to maintain an existing authorization object for a TCODE.

    1. Log in into SAP


    2. Type SU24 in the command field and hit enter
3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed.




4. Provide the Transaction code in the Transaction Code field in the Define Interval for
   Transaction code section.




5. Click Execute Button
6. Transaction List Screen Will be displayed




7. To Maintain an Authorization Object Click Check Indicator(Pencil Icon)
Select the TCODE and click on Check Indicator




8. A popup window “Prompt for work bench request” will be displayed for a transport
   request.
9. Click on New Request Icon to create a new transport request for the Authorization Object
   maintenance. Create Request Screen will be displayed




10. Enter Short Description in The “Short description field”
11. Click Save to Start the Changes, Prompt for Work Bench Requests Screen will be
    displayed with New Transport Request ID




12. Click “Continue” Button to Proceed
13. Authorization object maintenance screen will be displayed with the list of authorization
    objects which are already assigned to the Tcode.




14. In order to make an authorization object to be check maintained change check flag to CM
    as shown in the picture




15. Click SAVE.
IF USER JUST WANTS TO CHANGE THE INDICATOR THEN THE PROCESS STOPS
HERE. IF USER WANT TO DO ANY CHANGES FURTHER THEN THE CHECK
INDICATOR SHOULD BE IN “CM”
16. If User want to change Authorization Values then the Check should be at CM (Check
    Maintain). User Clicks on “Field Values” Button to ADD/DELETE/CHANGE Auth Values




17. Change Field values for authorization object Screen will be displayed with the
    Authorization Object and related Fields.
Authorization              Fields
Object




   18. To edit(Add/delete/update) the fields Click on Pen Icon displayed next to Authorization
       Field. “Define Values “ Screen Will be displayed
19. Select/Deselect or enter Appropriate values(As requested by customer) in the “Define
    Values” Screen and Click Save
Save
Button



         Follow Steps 17- 19 for maintaining values for all other Authorization Fields.

            20. Click Save and then Exit out of the screen.
Section B. Addition of Authorization Object to a TCODE
This Section will provide the details of adding an authorization object to a TCODE.

    1. Login to SAP




    2. Type SU24 in the Command field and Click Enter
3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed. Click
on Execute button




4. Transaction List Screen will be displayed. , Select a Record and Click on “Check Indicator “
Button.
4. Prompt for work bench Request Screen will be displayed.




5. Select Create New Request Button , Create Request Screen will be displayed.
6. Enter Short Description in the “Short Description field and click Save Button.




                                                      Short
                                                      Description
                                                      Field
Save
Button



         7. Prompt for Workbench Request screen will be displayed , Click on Continue(enter) button to
         proceed




         Continue Button
8. “Change Check Indicator for TCODE” Screen will be displayed with Check indicators for all
Authorization Groups.




9. Click on Auth Obj(Insert) Button to Add New Authorization Group.




                                       Auth Obj(Insert)
                                       button
10. Add authorization Object for Tcode button will be displayed.




11. Enter the Authorization Object to be added to the TCODE in the Authorization Obj field.
And Click Enter




12. The Authorization Object is added successfully to the Tcode , as shown in the “Change
Check indicator for TCODE” screen. Click Save button.




                                            Save




    13. Maintain the Authorization Values as shown in the Section A, Steps 16-20.
Section C. Delete Authorization Object Linked to a TCODE
This Section will provide the details of deleting an existing authorization object from a TCODE.

    1. Refer to Section B and Execute Steps 1 thru 9
    2. Go to Screen “change Check Indicator for TCODE” Screen




    3. Select the Authorization Object, To – Be Deleted.




    4. Select “Authorization Objs“ button from the main menu.
5.   Click Delete from the Dropdown menu. “Object Delete” Message box will be displayed .
6. Click Continue to proceed and delete the Authorization Object linked to Tcode .




7. Authorization Object is deleted from the “Change Check Indicator for TCODE” screen.




8. Click Save button to save the changes.
Please Let me know if any concerns.
Thanks,
Jays
http://sapsecurity.wordpress.com/

Weitere Àhnliche Inhalte

Was ist angesagt?

SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsTL Technologies - Thoughts Become Things
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRCtechgurusuresh
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceTLI GrowthSession
 
Mass User Password Reset Using Lsmw
Mass User Password Reset Using LsmwMass User Password Reset Using Lsmw
Mass User Password Reset Using LsmwDitto S Perumalsami
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil Kumar
 
Bridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow IntegrationBridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow IntegrationAlpha Sirius
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricksJasbir Khanuja
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security Siva Pradeep Bolisetti
 
Application Management Services
Application Management ServicesApplication Management Services
Application Management ServicesAshish Srivastava
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 

Was ist angesagt? (20)

SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
Mass User Password Reset Using Lsmw
Mass User Password Reset Using LsmwMass User Password Reset Using Lsmw
Mass User Password Reset Using Lsmw
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
 
Bridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow IntegrationBridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow Integration
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricks
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
Application Management Services
Application Management ServicesApplication Management Services
Application Management Services
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 

Ähnlich wie Su24

Authorization objects a simple guide.doc (1)
Authorization objects   a simple guide.doc (1)Authorization objects   a simple guide.doc (1)
Authorization objects a simple guide.doc (1)Vikram Polinati
 
C# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slidesC# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slidesSami Mut
 
Oracle ame complete setup
Oracle ame complete setupOracle ame complete setup
Oracle ame complete setuprahul chowdary
 
Bit2win 20r3.0 release pack
Bit2win 20r3.0 release packBit2win 20r3.0 release pack
Bit2win 20r3.0 release packGiacinto Mozzetta
 
Change transport system in SAP
Change transport system in SAP Change transport system in SAP
Change transport system in SAP chinu141
 
SAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.infoSAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.infosapdocs. info
 
Sales force class-3
Sales force class-3Sales force class-3
Sales force class-3Amit Sharma
 
Variant configuration-training-document
Variant configuration-training-documentVariant configuration-training-document
Variant configuration-training-documentSantosh Peddi
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-proceduresnarendar99
 
Tech ed 2012 eim260 modeling in sap hana-exercise
Tech ed 2012 eim260   modeling in sap hana-exerciseTech ed 2012 eim260   modeling in sap hana-exercise
Tech ed 2012 eim260 modeling in sap hana-exerciseLuc Vanrobays
 
Mastering dashboard and reporting guide
Mastering dashboard and reporting guideMastering dashboard and reporting guide
Mastering dashboard and reporting guideAmit Sharma
 
Ato cycle
Ato cycleAto cycle
Ato cycleSridhar
 
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...Ashish Gros Morceau
 
All-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by AitocAll-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by AitocAitoc, Inc
 
Sap tutorial for dynamics
Sap tutorial for dynamicsSap tutorial for dynamics
Sap tutorial for dynamicscolosimoricardo
 
Create Cost Centre Group
Create Cost Centre GroupCreate Cost Centre Group
Create Cost Centre GroupMuhammad Junaid
 

Ähnlich wie Su24 (20)

Authorization objects a simple guide.doc (1)
Authorization objects   a simple guide.doc (1)Authorization objects   a simple guide.doc (1)
Authorization objects a simple guide.doc (1)
 
C# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slidesC# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slides
 
Oracle ame complete setup
Oracle ame complete setupOracle ame complete setup
Oracle ame complete setup
 
Bit2win 20r3.0 release pack
Bit2win 20r3.0 release packBit2win 20r3.0 release pack
Bit2win 20r3.0 release pack
 
11 job costing
11 job costing11 job costing
11 job costing
 
Change transport system in SAP
Change transport system in SAP Change transport system in SAP
Change transport system in SAP
 
Project1 CS
Project1 CSProject1 CS
Project1 CS
 
SAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.infoSAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.info
 
Sales force class-3
Sales force class-3Sales force class-3
Sales force class-3
 
Variant configuration-training-document
Variant configuration-training-documentVariant configuration-training-document
Variant configuration-training-document
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-procedures
 
Tech ed 2012 eim260 modeling in sap hana-exercise
Tech ed 2012 eim260   modeling in sap hana-exerciseTech ed 2012 eim260   modeling in sap hana-exercise
Tech ed 2012 eim260 modeling in sap hana-exercise
 
Mastering dashboard and reporting guide
Mastering dashboard and reporting guideMastering dashboard and reporting guide
Mastering dashboard and reporting guide
 
Ato cycle
Ato cycleAto cycle
Ato cycle
 
Project1 VB
Project1 VBProject1 VB
Project1 VB
 
How to analyzing sap critical authorizations
How to analyzing sap critical authorizationsHow to analyzing sap critical authorizations
How to analyzing sap critical authorizations
 
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
 
All-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by AitocAll-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by Aitoc
 
Sap tutorial for dynamics
Sap tutorial for dynamicsSap tutorial for dynamics
Sap tutorial for dynamics
 
Create Cost Centre Group
Create Cost Centre GroupCreate Cost Centre Group
Create Cost Centre Group
 

KĂŒrzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

KĂŒrzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Su24

  • 1. HTTP://SAPSECURITY.WORDPRESS.COM/ SU24 Job Aid for SU24 Jays 11/28/2010 Purpose: Transaction SU24 maintains the USOBT_C and USOBX_C tables. These tables hold the relationships between the particular transaction and its authorization objects. It is possible to add or subtract the checks performed in the transaction by changing the appropriate flag. The addition (check or check/maintain) flag of an authority-check only works if SAP had provided the authorization object as standard in the calling program. Do not expect the system to perform an authority-check automatically when an object is added in the list of other objects for a particular transaction code because the calling program will have no knowledge of these objects. The subtraction (or no check) of an authority-check is possible to all transaction and all objects except HR and BASIS related authorization objects. The benefit of transaction SU24 occurs when transactions are added or deleted from Role Groups using the Profile Generator. When deleting transaction the Profile Generator will remove all authorization values that were needed for that transaction. When new transactions are added, the Profile Generator will add all authorization values needed to run the transaction(s). The addition or removal of authorization values is based upon values entered in SU24.
  • 2. Section A. Check/Maintain Authorization Values This section will explain the steps to maintain an existing authorization object for a TCODE. 1. Log in into SAP 2. Type SU24 in the command field and hit enter
  • 3. 3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed. 4. Provide the Transaction code in the Transaction Code field in the Define Interval for Transaction code section. 5. Click Execute Button
  • 4. 6. Transaction List Screen Will be displayed 7. To Maintain an Authorization Object Click Check Indicator(Pencil Icon)
  • 5. Select the TCODE and click on Check Indicator 8. A popup window “Prompt for work bench request” will be displayed for a transport request.
  • 6. 9. Click on New Request Icon to create a new transport request for the Authorization Object maintenance. Create Request Screen will be displayed 10. Enter Short Description in The “Short description field”
  • 7. 11. Click Save to Start the Changes, Prompt for Work Bench Requests Screen will be displayed with New Transport Request ID 12. Click “Continue” Button to Proceed
  • 8. 13. Authorization object maintenance screen will be displayed with the list of authorization objects which are already assigned to the Tcode. 14. In order to make an authorization object to be check maintained change check flag to CM as shown in the picture 15. Click SAVE.
  • 9. IF USER JUST WANTS TO CHANGE THE INDICATOR THEN THE PROCESS STOPS HERE. IF USER WANT TO DO ANY CHANGES FURTHER THEN THE CHECK INDICATOR SHOULD BE IN “CM”
  • 10. 16. If User want to change Authorization Values then the Check should be at CM (Check Maintain). User Clicks on “Field Values” Button to ADD/DELETE/CHANGE Auth Values 17. Change Field values for authorization object Screen will be displayed with the Authorization Object and related Fields.
  • 11. Authorization Fields Object 18. To edit(Add/delete/update) the fields Click on Pen Icon displayed next to Authorization Field. “Define Values “ Screen Will be displayed
  • 12. 19. Select/Deselect or enter Appropriate values(As requested by customer) in the “Define Values” Screen and Click Save
  • 13. Save Button Follow Steps 17- 19 for maintaining values for all other Authorization Fields. 20. Click Save and then Exit out of the screen.
  • 14. Section B. Addition of Authorization Object to a TCODE This Section will provide the details of adding an authorization object to a TCODE. 1. Login to SAP 2. Type SU24 in the Command field and Click Enter
  • 15. 3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed. Click on Execute button 4. Transaction List Screen will be displayed. , Select a Record and Click on “Check Indicator “ Button.
  • 16. 4. Prompt for work bench Request Screen will be displayed. 5. Select Create New Request Button , Create Request Screen will be displayed.
  • 17. 6. Enter Short Description in the “Short Description field and click Save Button. Short Description Field Save Button 7. Prompt for Workbench Request screen will be displayed , Click on Continue(enter) button to proceed Continue Button
  • 18. 8. “Change Check Indicator for TCODE” Screen will be displayed with Check indicators for all Authorization Groups. 9. Click on Auth Obj(Insert) Button to Add New Authorization Group. Auth Obj(Insert) button
  • 19. 10. Add authorization Object for Tcode button will be displayed. 11. Enter the Authorization Object to be added to the TCODE in the Authorization Obj field. And Click Enter 12. The Authorization Object is added successfully to the Tcode , as shown in the “Change Check indicator for TCODE” screen. Click Save button. Save 13. Maintain the Authorization Values as shown in the Section A, Steps 16-20.
  • 20. Section C. Delete Authorization Object Linked to a TCODE This Section will provide the details of deleting an existing authorization object from a TCODE. 1. Refer to Section B and Execute Steps 1 thru 9 2. Go to Screen “change Check Indicator for TCODE” Screen 3. Select the Authorization Object, To – Be Deleted. 4. Select “Authorization Objs“ button from the main menu.
  • 21. 5. Click Delete from the Dropdown menu. “Object Delete” Message box will be displayed .
  • 22. 6. Click Continue to proceed and delete the Authorization Object linked to Tcode . 7. Authorization Object is deleted from the “Change Check Indicator for TCODE” screen. 8. Click Save button to save the changes.
  • 23. Please Let me know if any concerns. Thanks, Jays http://sapsecurity.wordpress.com/