{"id":903,"date":"2012-02-08T03:30:24","date_gmt":"2012-02-08T03:30:24","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=903"},"modified":"2015-05-03T09:24:41","modified_gmt":"2015-05-03T09:24:41","slug":"su24-custom-tables-usobt_c-and-usobx_c","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/su24-custom-tables-usobt_c-and-usobx_c\/","title":{"rendered":"SU24 Custom Tables USOBT_C and USOBX_C"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">We discussed about the basics of SU24 tcode in our previous discussion. In this discussion, we will be discussing about the SU24 custom tables<\/span> <strong>USOBT_C<\/strong> and <strong>USOBX_C<\/strong>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">In our last discussion, we saw that SU24 tcode is used to maintain all those authorization objects that are checked during the execution of a particular transaction. We also saw that for every authorization object that is in SU24 screen, there is a corresponding value for two fields &#8211; Check Indicator (Check\/Do Not Check) and Proposal (Yes\/No).<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\"><span style=\"font-family: verdana;\">These values are stored in two <\/span><strong style=\"font-family: verdana;\">customer<\/strong><strong><span style=\"font-family: verdana;\">\u00a0specific tables &#8211; USOBT_C and USOBX_C. <\/span><\/strong>The &#8220;<strong>_C<\/strong>&#8221; in these table names indicate that these tables contain <strong>customer specific<\/strong> values which are maintained\/changed via SU24 tcode.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\"><strong>If the Profile Generator is used for the first time, <\/strong>these customer specific tables are initially filled<\/span> <\/span><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">with SAP Default Proposed values. SAP Proposed values are stored in tables <\/span><\/span><strong><span style=\"color: #0000ff;\">USOBT <\/span><\/strong><span style=\"color: #0000ff;\">and <strong>USOBX<\/strong>. <span style=\"color: #4c4c4c;\">We can also have a look at thes<\/span><span style=\"color: #4c4c4c;\">e val<\/span><span style=\"color: #4c4c4c;\">ues via Tcode <\/span><strong><span style=\"color: #4c4c4c;\">SU22.<\/span><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/strong><span style=\"color: #4c4c4c;\">These values<strong> should NOT be <\/strong>manually changed.<\/span><span style=\"color: #4c4c4c;\"> These get updated during upgrades.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><br \/>\n<\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">While the SAP Proposed values (in tables USOBT and USOBX) get updated during future upgrades, the customer specific tables (USOBT_C and USOBX_C) ensure that values modified by customer are not overwritten to SAP default unless explicitly changed by user<\/span> (via Tcode <strong>SU25 &#8211; step 1<\/strong>). <span style=\"color: #4c4c4c;\">We will discuss more about SU25 when we discuss about<\/span> <span style=\"text-decoration: underline;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/su25-steps\" target=\"_blank\"><span style=\"color: #e63518;\"><strong>SAP Security Upgrade<\/strong><\/span><\/a><\/span><span style=\"color: #4c4c4c;\"> in coming topics.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Now lets come to the basic Question : <strong>What values are maintained in the USOBT_C and USOBX_C tables?\u00a0<\/strong><\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">The <\/span><\/span><span style=\"color: #4c4c4c;\"><strong>USOBX_C <\/strong><\/span><span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">table defines what authorization checks are to be performed within a transaction and what not, i.e<\/span>. <span style=\"color: #4c4c4c;\">whether the <strong>check indicator <\/strong>field is set to <strong>&#8220;Check&#8221; <\/strong>or to <strong>&#8220;Do Not Check&#8221;.<\/strong>\u00a0This table also defines which authorization checks are <strong>maintained (Proposal Value &#8211; Yes)<\/strong> in the Profile Generator.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> The table <\/span><\/span><span style=\"color: #4c4c4c;\"><strong>USOBT_C <\/strong>is for those authorization objects for which the <strong>Proposal <\/strong>values is <strong>Yes <\/strong>in SU24. It contains <strong>Authorization values<\/strong> for the authorization objects which are defined to be maintained (Proposal value &#8220;Yes&#8221;) in profile generator.<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\"> Whenever any change in proposal value is made for any transaction code in SU24, the new values should be pulled to all those roles where that particular tcode is present in role menu. In this case, all such roles&#8217; profile should be generated in<\/span> <\/span><strong><span style=\"color: #0000ff;\">Expert Mode for Profile Generation<\/span><\/strong><span style=\"color: #0000ff;\">. <span style=\"color: #4c4c4c;\">The option to be selected is<\/span> &#8220;Read Old Status and Merge with New Data&#8221;.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/02\/expert-mode.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-911\" title=\"expert mode\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/02\/expert-mode.jpg\" alt=\"\" width=\"590\" height=\"173\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/02\/expert-mode.jpg 590w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/02\/expert-mode-300x87.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/02\/expert-mode-290x85.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/02\/expert-mode-150x43.jpg 150w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\n\n\/\/ ]]><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/903"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=903"}],"version-history":[{"count":20,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/903\/revisions"}],"predecessor-version":[{"id":2140,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/903\/revisions\/2140"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}