SAP 7090310 Ficha de datos Pagina 613

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 706
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 612
Note:
You can now use wildcards to specify the table name. This is an efficient way to apply an authorization
to multiple tables with similar names simultaneously. Use * to specify zero or more characters and
+ to specify one character.
3.
Click Create.
The "Authorization entries" screen appears.
This screen lists the authorization entries (if any) that are currently applied to the table.
4.
Click Custom exit.
The "Edit custom function security exit mappings" window appears.
5.
In the Function name field, type the name of the function that you want to use to secure the table,
and then click Transfer.
For this example, type HR_CHECK_AUTHORITY_INFTY.
6.
For each necessary parameter, specify a value or field to map to that parameter.
In this example make the entries listed in the table below:
Field nameImported parameter name
'0000'
INFTY
=PERNR
PERNR
=SUBTY
SUBTY
7.
Click Save.
You are returned to the "Authorization entries" screen, which now indicates that there is an active
custom security exit for this table.
When a user attempts to access a table secured by a custom security exit, the driver checks the
appropriate field(s) in the table. The field values you mapped are passed as parameters to the
function you selected, in this example HR_CHECK_AUTHORITY_INFTY. When authorization
restrictions are combined with the values you mapped, the authorization restrictions filters the results
first, and then the mapped values further filter the results.
2011-05-16613
Integrating Business Applications with Crystal Reports
Vista de pagina 612
1 2 ... 608 609 610 611 612 613 614 615 616 617 618 ... 705 706

Comentarios a estos manuales

Vikixwk 04 Jan 2024 | 13:20:14

urenrjrjkvnm

Viktorihon 14 Jan 2024 | 00:44:53

Cinema