SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
HTTP://SAPSECURITY.WORDPRESS.COM/




                                        SU24
                                     Job Aid for SU24

                                               Jays
                                            11/28/2010




Purpose: Transaction SU24 maintains the USOBT_C and USOBX_C tables. These tables hold
the relationships between the particular transaction and its authorization objects. It is possible to
add or subtract the checks performed in the transaction by changing the appropriate flag.
         The addition (check or check/maintain) flag of an authority-check only works if SAP had
provided the authorization object as standard in the calling program. Do not expect the system to
perform an authority-check automatically when an object is added in the list of other objects for a
particular transaction code because the calling program will have no knowledge of these objects.
The subtraction (or no check) of an authority-check is possible to all transaction and all objects
except HR and BASIS related authorization objects.
         The benefit of transaction SU24 occurs when transactions are added or deleted from
Role Groups using the Profile Generator. When deleting transaction the Profile Generator will
remove all authorization values that were needed for that transaction. When new transactions are
added, the Profile Generator will add all authorization values needed to run the transaction(s).
The addition or removal of authorization values is based upon values entered in SU24.
Section A. Check/Maintain Authorization Values
This section will explain the steps to maintain an existing authorization object for a TCODE.

    1. Log in into SAP


    2. Type SU24 in the command field and hit enter
3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed.




4. Provide the Transaction code in the Transaction Code field in the Define Interval for
   Transaction code section.




5. Click Execute Button
6. Transaction List Screen Will be displayed




7. To Maintain an Authorization Object Click Check Indicator(Pencil Icon)
Select the TCODE and click on Check Indicator




8. A popup window “Prompt for work bench request” will be displayed for a transport
   request.
9. Click on New Request Icon to create a new transport request for the Authorization Object
   maintenance. Create Request Screen will be displayed




10. Enter Short Description in The “Short description field”
11. Click Save to Start the Changes, Prompt for Work Bench Requests Screen will be
    displayed with New Transport Request ID




12. Click “Continue” Button to Proceed
13. Authorization object maintenance screen will be displayed with the list of authorization
    objects which are already assigned to the Tcode.




14. In order to make an authorization object to be check maintained change check flag to CM
    as shown in the picture




15. Click SAVE.
IF USER JUST WANTS TO CHANGE THE INDICATOR THEN THE PROCESS STOPS
HERE. IF USER WANT TO DO ANY CHANGES FURTHER THEN THE CHECK
INDICATOR SHOULD BE IN “CM”
16. If User want to change Authorization Values then the Check should be at CM (Check
    Maintain). User Clicks on “Field Values” Button to ADD/DELETE/CHANGE Auth Values




17. Change Field values for authorization object Screen will be displayed with the
    Authorization Object and related Fields.
Authorization              Fields
Object




   18. To edit(Add/delete/update) the fields Click on Pen Icon displayed next to Authorization
       Field. “Define Values “ Screen Will be displayed
19. Select/Deselect or enter Appropriate values(As requested by customer) in the “Define
    Values” Screen and Click Save
Save
Button



         Follow Steps 17- 19 for maintaining values for all other Authorization Fields.

            20. Click Save and then Exit out of the screen.
Section B. Addition of Authorization Object to a TCODE
This Section will provide the details of adding an authorization object to a TCODE.

    1. Login to SAP




    2. Type SU24 in the Command field and Click Enter
3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed. Click
on Execute button




4. Transaction List Screen will be displayed. , Select a Record and Click on “Check Indicator “
Button.
4. Prompt for work bench Request Screen will be displayed.




5. Select Create New Request Button , Create Request Screen will be displayed.
6. Enter Short Description in the “Short Description field and click Save Button.




                                                      Short
                                                      Description
                                                      Field
Save
Button



         7. Prompt for Workbench Request screen will be displayed , Click on Continue(enter) button to
         proceed




         Continue Button
8. “Change Check Indicator for TCODE” Screen will be displayed with Check indicators for all
Authorization Groups.




9. Click on Auth Obj(Insert) Button to Add New Authorization Group.




                                       Auth Obj(Insert)
                                       button
10. Add authorization Object for Tcode button will be displayed.




11. Enter the Authorization Object to be added to the TCODE in the Authorization Obj field.
And Click Enter




12. The Authorization Object is added successfully to the Tcode , as shown in the “Change
Check indicator for TCODE” screen. Click Save button.




                                            Save




    13. Maintain the Authorization Values as shown in the Section A, Steps 16-20.
Section C. Delete Authorization Object Linked to a TCODE
This Section will provide the details of deleting an existing authorization object from a TCODE.

    1. Refer to Section B and Execute Steps 1 thru 9
    2. Go to Screen “change Check Indicator for TCODE” Screen




    3. Select the Authorization Object, To – Be Deleted.




    4. Select “Authorization Objs“ button from the main menu.
5.   Click Delete from the Dropdown menu. “Object Delete” Message box will be displayed .
6. Click Continue to proceed and delete the Authorization Object linked to Tcode .




7. Authorization Object is deleted from the “Change Check Indicator for TCODE” screen.




8. Click Save button to save the changes.
Please Let me know if any concerns.
Thanks,
Jays
http://sapsecurity.wordpress.com/

Contenu connexe

Tendances

SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceTLI GrowthSession
 
Mass User Password Reset Using Lsmw
Mass User Password Reset Using LsmwMass User Password Reset Using Lsmw
Mass User Password Reset Using LsmwDitto S Perumalsami
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil Kumar
 
Bridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow IntegrationBridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow IntegrationAlpha Sirius
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricksJasbir Khanuja
 
Application Management Services
Application Management ServicesApplication Management Services
Application Management ServicesAshish Srivastava
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 

Tendances (20)

SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
Mass User Password Reset Using Lsmw
Mass User Password Reset Using LsmwMass User Password Reset Using Lsmw
Mass User Password Reset Using Lsmw
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
 
Bridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow IntegrationBridging The Gap: SAP Solution Manager To ServiceNow Integration
Bridging The Gap: SAP Solution Manager To ServiceNow Integration
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricks
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
Application Management Services
Application Management ServicesApplication Management Services
Application Management Services
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 

Similaire à Su24

Authorization objects a simple guide.doc (1)
Authorization objects   a simple guide.doc (1)Authorization objects   a simple guide.doc (1)
Authorization objects a simple guide.doc (1)Vikram Polinati
 
C# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slidesC# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slidesSami Mut
 
Oracle ame complete setup
Oracle ame complete setupOracle ame complete setup
Oracle ame complete setuprahul chowdary
 
Change transport system in SAP
Change transport system in SAP Change transport system in SAP
Change transport system in SAP chinu141
 
SAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.infoSAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.infosapdocs. info
 
Sales force class-3
Sales force class-3Sales force class-3
Sales force class-3Amit Sharma
 
Variant configuration-training-document
Variant configuration-training-documentVariant configuration-training-document
Variant configuration-training-documentSantosh Peddi
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-proceduresnarendar99
 
Tech ed 2012 eim260 modeling in sap hana-exercise
Tech ed 2012 eim260   modeling in sap hana-exerciseTech ed 2012 eim260   modeling in sap hana-exercise
Tech ed 2012 eim260 modeling in sap hana-exerciseLuc Vanrobays
 
Mastering dashboard and reporting guide
Mastering dashboard and reporting guideMastering dashboard and reporting guide
Mastering dashboard and reporting guideAmit Sharma
 
Ato cycle
Ato cycleAto cycle
Ato cycleSridhar
 
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...Ashish Gros Morceau
 
All-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by AitocAll-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by AitocAitoc, Inc
 
Sap tutorial for dynamics
Sap tutorial for dynamicsSap tutorial for dynamics
Sap tutorial for dynamicscolosimoricardo
 
Create Cost Centre Group
Create Cost Centre GroupCreate Cost Centre Group
Create Cost Centre GroupMuhammad Junaid
 

Similaire à Su24 (20)

Authorization objects a simple guide.doc (1)
Authorization objects   a simple guide.doc (1)Authorization objects   a simple guide.doc (1)
Authorization objects a simple guide.doc (1)
 
C# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slidesC# Tutorial MSM_Murach chapter-10-slides
C# Tutorial MSM_Murach chapter-10-slides
 
Oracle ame complete setup
Oracle ame complete setupOracle ame complete setup
Oracle ame complete setup
 
Bit2win 20r3.0 release pack
Bit2win 20r3.0 release packBit2win 20r3.0 release pack
Bit2win 20r3.0 release pack
 
11 job costing
11 job costing11 job costing
11 job costing
 
Change transport system in SAP
Change transport system in SAP Change transport system in SAP
Change transport system in SAP
 
Project1 CS
Project1 CSProject1 CS
Project1 CS
 
SAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.infoSAP PM Training Manual - www.sapdocs.info
SAP PM Training Manual - www.sapdocs.info
 
Sales force class-3
Sales force class-3Sales force class-3
Sales force class-3
 
Variant configuration-training-document
Variant configuration-training-documentVariant configuration-training-document
Variant configuration-training-document
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-procedures
 
Tech ed 2012 eim260 modeling in sap hana-exercise
Tech ed 2012 eim260   modeling in sap hana-exerciseTech ed 2012 eim260   modeling in sap hana-exercise
Tech ed 2012 eim260 modeling in sap hana-exercise
 
Mastering dashboard and reporting guide
Mastering dashboard and reporting guideMastering dashboard and reporting guide
Mastering dashboard and reporting guide
 
Ato cycle
Ato cycleAto cycle
Ato cycle
 
Project1 VB
Project1 VBProject1 VB
Project1 VB
 
How to analyzing sap critical authorizations
How to analyzing sap critical authorizationsHow to analyzing sap critical authorizations
How to analyzing sap critical authorizations
 
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
Ac fr ogahtrvphwaee1e8gutdnexalzr6og7ijdtzjl_phlut4glpu9b3si-jfuc1bukldiyan6a...
 
All-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by AitocAll-In-One Checkout User Manual for Magento by Aitoc
All-In-One Checkout User Manual for Magento by Aitoc
 
Sap tutorial for dynamics
Sap tutorial for dynamicsSap tutorial for dynamics
Sap tutorial for dynamics
 
Create Cost Centre Group
Create Cost Centre GroupCreate Cost Centre Group
Create Cost Centre Group
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Su24

  • 1. HTTP://SAPSECURITY.WORDPRESS.COM/ SU24 Job Aid for SU24 Jays 11/28/2010 Purpose: Transaction SU24 maintains the USOBT_C and USOBX_C tables. These tables hold the relationships between the particular transaction and its authorization objects. It is possible to add or subtract the checks performed in the transaction by changing the appropriate flag. The addition (check or check/maintain) flag of an authority-check only works if SAP had provided the authorization object as standard in the calling program. Do not expect the system to perform an authority-check automatically when an object is added in the list of other objects for a particular transaction code because the calling program will have no knowledge of these objects. The subtraction (or no check) of an authority-check is possible to all transaction and all objects except HR and BASIS related authorization objects. The benefit of transaction SU24 occurs when transactions are added or deleted from Role Groups using the Profile Generator. When deleting transaction the Profile Generator will remove all authorization values that were needed for that transaction. When new transactions are added, the Profile Generator will add all authorization values needed to run the transaction(s). The addition or removal of authorization values is based upon values entered in SU24.
  • 2. Section A. Check/Maintain Authorization Values This section will explain the steps to maintain an existing authorization object for a TCODE. 1. Log in into SAP 2. Type SU24 in the command field and hit enter
  • 3. 3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed. 4. Provide the Transaction code in the Transaction Code field in the Define Interval for Transaction code section. 5. Click Execute Button
  • 4. 6. Transaction List Screen Will be displayed 7. To Maintain an Authorization Object Click Check Indicator(Pencil Icon)
  • 5. Select the TCODE and click on Check Indicator 8. A popup window “Prompt for work bench request” will be displayed for a transport request.
  • 6. 9. Click on New Request Icon to create a new transport request for the Authorization Object maintenance. Create Request Screen will be displayed 10. Enter Short Description in The “Short description field”
  • 7. 11. Click Save to Start the Changes, Prompt for Work Bench Requests Screen will be displayed with New Transport Request ID 12. Click “Continue” Button to Proceed
  • 8. 13. Authorization object maintenance screen will be displayed with the list of authorization objects which are already assigned to the Tcode. 14. In order to make an authorization object to be check maintained change check flag to CM as shown in the picture 15. Click SAVE.
  • 9. IF USER JUST WANTS TO CHANGE THE INDICATOR THEN THE PROCESS STOPS HERE. IF USER WANT TO DO ANY CHANGES FURTHER THEN THE CHECK INDICATOR SHOULD BE IN “CM”
  • 10. 16. If User want to change Authorization Values then the Check should be at CM (Check Maintain). User Clicks on “Field Values” Button to ADD/DELETE/CHANGE Auth Values 17. Change Field values for authorization object Screen will be displayed with the Authorization Object and related Fields.
  • 11. Authorization Fields Object 18. To edit(Add/delete/update) the fields Click on Pen Icon displayed next to Authorization Field. “Define Values “ Screen Will be displayed
  • 12. 19. Select/Deselect or enter Appropriate values(As requested by customer) in the “Define Values” Screen and Click Save
  • 13. Save Button Follow Steps 17- 19 for maintaining values for all other Authorization Fields. 20. Click Save and then Exit out of the screen.
  • 14. Section B. Addition of Authorization Object to a TCODE This Section will provide the details of adding an authorization object to a TCODE. 1. Login to SAP 2. Type SU24 in the Command field and Click Enter
  • 15. 3. Maintain Assignment of Authorization Objects to Transactions Screen will be displayed. Click on Execute button 4. Transaction List Screen will be displayed. , Select a Record and Click on “Check Indicator “ Button.
  • 16. 4. Prompt for work bench Request Screen will be displayed. 5. Select Create New Request Button , Create Request Screen will be displayed.
  • 17. 6. Enter Short Description in the “Short Description field and click Save Button. Short Description Field Save Button 7. Prompt for Workbench Request screen will be displayed , Click on Continue(enter) button to proceed Continue Button
  • 18. 8. “Change Check Indicator for TCODE” Screen will be displayed with Check indicators for all Authorization Groups. 9. Click on Auth Obj(Insert) Button to Add New Authorization Group. Auth Obj(Insert) button
  • 19. 10. Add authorization Object for Tcode button will be displayed. 11. Enter the Authorization Object to be added to the TCODE in the Authorization Obj field. And Click Enter 12. The Authorization Object is added successfully to the Tcode , as shown in the “Change Check indicator for TCODE” screen. Click Save button. Save 13. Maintain the Authorization Values as shown in the Section A, Steps 16-20.
  • 20. Section C. Delete Authorization Object Linked to a TCODE This Section will provide the details of deleting an existing authorization object from a TCODE. 1. Refer to Section B and Execute Steps 1 thru 9 2. Go to Screen “change Check Indicator for TCODE” Screen 3. Select the Authorization Object, To – Be Deleted. 4. Select “Authorization Objs“ button from the main menu.
  • 21. 5. Click Delete from the Dropdown menu. “Object Delete” Message box will be displayed .
  • 22. 6. Click Continue to proceed and delete the Authorization Object linked to Tcode . 7. Authorization Object is deleted from the “Change Check Indicator for TCODE” screen. 8. Click Save button to save the changes.
  • 23. Please Let me know if any concerns. Thanks, Jays http://sapsecurity.wordpress.com/