{"id":511,"date":"2012-01-18T03:26:07","date_gmt":"2012-01-18T03:26:07","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=511"},"modified":"2021-06-28T05:15:42","modified_gmt":"2021-06-28T05:15:42","slug":"su24-concept-in-sap","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/su24-concept-in-sap\/","title":{"rendered":"SU24 (Maintain Check Indicators)"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">As we discussed earlier, a tcode is like a command which when executed executes an ABAP program, report etc. When the program gets executed, it may check for certain authorization objects.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> <!--more--><br \/>\nThese authorization objects are coded in the program under &#8220;<span style=\"color: #0000ff;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/?page_id=524\"><span style=\"color: #0000ff;\">AUTHORITY-CHECK<\/span><\/a><\/span>&#8221; statement.<\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><!--more--><br \/>\nSU24 is one of the most important tcodes in SAP Security. It is used to maintain authorization objects that are checked during the execution of a particular transaction code. <\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> For example &#8211; a screenshot of SU24 entry for<\/span> <strong>PFCG<\/strong> <span style=\"color: #4c4c4c;\">transaction code is shown in the below figure:<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1.jpg\"><!--more--><\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-803\" title=\"su24-1\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1.jpg\" alt=\"\" width=\"517\" height=\"205\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1.jpg 568w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1-300x119.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1-290x115.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1-150x59.jpg 150w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-1.jpg\"><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">SU24 is like a check and check-maintain &#8220;container&#8221; which is used for maintaining those authorization objects which are checked when ABAP programs are executed.<\/span><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #4c4c4c; font-family: verdana;\"> <!--more--><br \/>\nWhenever any tcode (or program) is executed and if it checks if the user has access to some authorization object performing the task concerned, then it is always a good practice to add that authorization object in SU24 entry for that transaction code.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> Lets go through some of the important concepts related to SU24 tcode. For that lets have a look at the SU24 screenshot for tcode FPE3S below:<\/span><br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24.jpg\"><!--more--><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-794\" title=\"su24\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24.jpg\" alt=\"\" width=\"755\" height=\"281\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24.jpg 755w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-300x111.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-290x107.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/su24-150x55.jpg 150w\" sizes=\"(max-width: 755px) 100vw, 755px\" \/><br \/>\n<\/a><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"> <span style=\"color: #4c4c4c;\">As we can see this screen shows SU24 entries for tcode FPE3S. On the left side, we have tcode name and description and on the right side, we have authorization objects and other fields like TSTCS, Check Indicator and Proposal.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> <!--more--><\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nThe Object field shows the list of authorization objects which are checked for tcode FPE3S.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nWe have already discussed that SU24 maintains the authorization objects which are checked by a tcode. Although just maintaining any authorization object does not mean that the object will be checked. It is necessary that the object is coded in the &#8220;Authority-Check&#8221; statement in the ABAP code. Simply inserting an authorization object in SU24 which is not checked in the program is not going to make any difference.<br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\"> SU24 provides us with an option to set if any authorization object can be set to &#8220;Do not check&#8221;, i.e even if the object is coded in the program, the object will not be checked while executing the tcode. As shown in the figure above, we can see that Check Indicator Field gives us this option to set the authorization object check value to<\/span> &#8220;<\/span><strong><span style=\"color: #0000ff;\">Check&#8221; <\/span><\/strong><span style=\"color: #0000ff;\">or &#8220;<strong>Do Not Check&#8221;.<\/strong><br \/>\n<\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">Next to Check Indicator field is<\/span> <strong>Proposal field<\/strong>.<span style=\"color: #4c4c4c;\"> It can have values<\/span> &#8220;<\/span><strong><span style=\"color: #0000ff;\">Yes&#8221;<\/span><\/strong><span style=\"color: #0000ff;\">\u00a0or <strong>No&#8221;<\/strong><span style=\"color: #4c4c4c;\">. Lets discuss this &#8220;Proposal&#8221; field via the below screenshot:<\/span><br \/>\n<\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-799\" title=\"proposal\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal.jpg\" alt=\"\" width=\"750\" height=\"464\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal.jpg 750w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal-300x185.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal-290x179.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal-150x92.jpg 150w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/proposal.jpg\"><br \/>\n<\/a><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">We can see in the above figure that for object F_KKKO_BEG, the proposal value is set to &#8220;<\/span><\/span><strong style=\"color: #0000ff;\"><span style=\"font-family: verdana; color: #4c4c4c;\">Yes&#8221;.<\/span><\/strong><\/p>\n<p><strong style=\"color: #0000ff;\"><br \/>\n<\/strong><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">If we double click on the object F_KKKO_BEG or if we click on &#8220;Field Values&#8221; (as shown in the figure), we get to see some authorization field values for object F_KKKO_BEG at the bottom of the screen as shown above. These are the proposed values and when the tcode FPE3S (as per this example) is added to any role menu, these values automatically get pulled in the role.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> These are helpful as the important objects which are set to proposal &#8220;Yes&#8221;\u00a0automatically\u00a0get pulled to the role and thus are very helpful in role maintenance.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">If the proposal value is set to &#8220;No&#8221; and the Check Indicator is set to &#8220;Check&#8221;, then it means that the object will be checked while tcode execution but no default proposed value gets pulled to the role during assignment of tcode to the role menu.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> Lets have a\u00a0summarized\u00a0look at what we discussed about check indicators:\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<ul>\n<li><span style=\"color: #0000ff; font-family: verdana;\"><strong>Check \/ No<\/strong> &#8211; <span style=\"color: #4c4c4c;\">Authorization object is checked while tcode execution, but No authorization object field value is proposed when tcode is added to<\/span> Role <\/span><strong><span style=\"color: #0000ff;\">Menu.<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #0000ff;\">Check \/ Yes <\/span><\/strong><span style=\"color: #0000ff;\">&#8211; <span style=\"color: #4c4c4c;\">Authorization object is checked while tcode execution and the authorization object automatically gets pulled in the role when the tcode is added to Role Menu. The authorization which is pulled may or may not have some field values depending on what is maintained in SU24 in that object for that tcode.<\/span><\/span><\/li>\n<li><strong><span style=\"color: #0000ff;\">Do Not Check &#8211; <\/span><\/strong><span style=\"color: #4c4c4c;\">The object is not checked even though it may be in the ABAP Code.<\/span><\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><strong><span style=\"color: #0000ff;\"><!--more--><\/span><\/strong><\/div>\n<div><\/div>\n<div><strong><span style=\"color: #0000ff;\"><br \/>\nNOTE : <\/span><\/strong><span style=\"color: #0000ff;\">The\u00a0<\/span><strong><span style=\"color: #0000ff;\">\u00a0Do Not Check <\/span><\/strong><span style=\"color: #0000ff;\">check indicator <strong>CANNOT <\/strong>be set for <strong>HR <\/strong>and <strong>BASIS <\/strong>tcodes.<\/span><\/div>\n<div><\/div>\n<div><\/div>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #e63518;\">In the next lecture we will further discuss about some<span style=\"text-decoration: underline;\"> <em><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/su24-custom-tables-usobt_c-and-usobx_c\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #e63518; text-decoration: underline;\">more<\/span><\/a>\u00a0<\/em><\/span><\/span><\/span><span style=\"text-decoration: underline;\"><span style=\"color: #e63518; text-decoration: underline;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/su24-custom-tables-usobt_c-and-usobx_c\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #e63518; text-decoration: underline;\"><em><strong>IMPORTANT <\/strong>features of SU24 tcode.<\/em><\/span><\/a><\/span><\/span><\/h3>\n<p><script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/511"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=511"}],"version-history":[{"count":41,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/511\/revisions"}],"predecessor-version":[{"id":2579,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/511\/revisions\/2579"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}