Where Used List (Function Module) for SAP ABAP Data Element ACTIV_AUTH (Activity)
SAP ABAP Data Element
ACTIV_AUTH (Activity) is used by
pages: 1 2 3
# | Object Type | Object Name | Object Description | Package | Structure Package | Software Component |
---|---|---|---|---|---|---|
![]() |
![]() |
![]() |
![]() |
![]() |
||
1 | ![]() |
FM_AUTH_CHECK_GRP_FC_EXTERNAL VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsverprobung finanzstellenintern (nur Budgetierung) | ![]() |
![]() |
![]() |
2 | ![]() |
FM_AUTH_CHECK_GRP_FUND VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsverprobung auf Berechtigungsgruppe des Fonds | ![]() |
![]() |
![]() |
3 | ![]() |
FM_AUTH_CHECK_GRP_FUND VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
HHM: Berechtigungsverprobung auf Berechtigungsgruppe des Fonds | ![]() |
![]() |
![]() |
4 | ![]() |
FM_AUTH_CHECK_GRP_FUNDS_CENTER VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsverprobung auf Berechtigungsgruppe der Finanzstelle | ![]() |
![]() |
![]() |
5 | ![]() |
FM_AUTH_CHECK_GRP_FUNDS_CENTER VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
HHM: Berechtigungsverprobung auf Berechtigungsgruppe der Finanzstelle | ![]() |
![]() |
![]() |
6 | ![]() |
FM_AUTH_CHECK_HHM VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsverprobung im Haushaltsmanagement | ![]() |
![]() |
![]() |
7 | ![]() |
FM_AUTH_CHECK_HHM VALUE(I_ACTVT_A) LIKE TACT-ACTVT DEFAULT SPACE
|
HHM: Berechtigungsverprobung im Haushaltsmanagement | ![]() |
![]() |
![]() |
8 | ![]() |
FM_AUTH_CHECK_MD_FUNC_AREA VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsprüfung auf Berechtigungsgruppe des Funktionsbereichs | ![]() |
![]() |
![]() |
9 | ![]() |
FM_AUTH_CHECK_MD_FUNC_AREA VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
HHM: Berechtigungsprüfung auf Berechtigungsgruppe des Funktionsbereichs | ![]() |
![]() |
![]() |
10 | ![]() |
FM_AUTH_CHECK_MD_MEASURE VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
HHM: Berechtigungsprüfung auf Berechtigungsgruppe des Haushaltsprogrammes | ![]() |
![]() |
![]() |
11 | ![]() |
FM_AUTH_CHECK_MD_MEASURE VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsprüfung auf Berechtigungsgruppe des Haushaltsprogrammes | ![]() |
![]() |
![]() |
12 | ![]() |
FM_AUTH_CHECK_SETS VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
HHM: Berechtigungspruefung zu Gruppen (SETs) | ![]() |
![]() |
![]() |
13 | ![]() |
FM_AUTH_CHECK_VERSION VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
HHM: Berechtigungsverprobung auf (Budget-)Version | ![]() |
![]() |
![]() |
14 | ![]() |
FM_AUTH_CHECK_VERSION VALUE(I_ACTVT) LIKE TACT-ACTVT
|
HHM: Berechtigungsverprobung auf (Budget-)Version | ![]() |
![]() |
![]() |
15 | ![]() |
FM_DOC_WITH_DATA_PRINT VALUE(I_ACTIVITY) LIKE TACT-ACTVT
|
Druck einer Anordnung durch Übergabe der Daten | ![]() |
![]() |
![]() |
16 | ![]() |
FM_FI_TAX_SCREEN_CALL REFERENCE(I_ACTIVITY) LIKE TACT-ACTVT
|
Aufruf des Bildschirmes fuer Steuerbetraege | ![]() |
![]() |
![]() |
17 | ![]() |
FM_FYC_AUTHORITY_CHECK REFERENCE(I_ACTIVITY_A) TYPE TACT-ACTVT DEFAULT FMAU_AC_INI
|
Berechtigungsprüfung für GJW Programme | ![]() |
![]() |
![]() |
18 | ![]() |
FM_FYC_AUTHORITY_CHECK REFERENCE(I_ACTIVITY) TYPE TACT-ACTVT DEFAULT FMAU_CF_CHANGE
|
Berechtigungsprüfung für GJW Programme | ![]() |
![]() |
![]() |
19 | ![]() |
FM_FYC_SCHEDMAN_INIT REFERENCE(I_ACTIVITY) TYPE SCHEDMAN_DETAIL_USER-ACTIVITY DEFAULT '16'
|
Schedman Monitor initialisieren | ![]() |
![]() |
![]() |
20 | ![]() |
FM_PSO_GET_FIELD_STATUS REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Feldstatus setzen (einblenden, ausblenden, etc) | ![]() |
![]() |
![]() |
21 | ![]() |
FM_PSO_GET_HIGHST_ACTVT VALUE(C_ACTVT) LIKE TACT-ACTVT OPTIONAL
|
get the highest activity in requests | ![]() |
![]() |
![]() |
22 | ![]() |
FPB_EXP_UTILS_CHECK_AUTHORITY REFERENCE(ID_ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsverprobung | ![]() |
![]() |
![]() |
23 | ![]() |
FPB_EXP_UTILS_CHECK_AUTHORITY
|
Berechtigungsverprobung | ![]() |
![]() |
![]() |
24 | ![]() |
FSCD_SAMPLE_0040_AR VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Exit 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
25 | ![]() |
FSC_EVENT_0040 VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
FI-CA extended: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
26 | ![]() |
FTE_BSM_EXT_STATEMENTDATA_GET
|
FTE_BSM: Selektieren externe Auszugsdaten | ![]() |
![]() |
![]() |
27 | ![]() |
FTR_API_FXT_INIT_CREATE VALUE(ACTIVITY) TYPE TACT-ACTVT
|
Einstieg Anlegen eines neuen Geschäftes | ![]() |
![]() |
![]() |
28 | ![]() |
FTR_CREATE_FXOPTIONS_INT VALUE(ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
Anlegen Devisenoptionen | ![]() |
![]() |
![]() |
29 | ![]() |
FTR_DEAL_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Prüfung Geschäftsberechtigung | ![]() |
![]() |
![]() |
30 | ![]() |
FTR_FX_CASHSETTL_OPT_PLAN VALUE(MODUS) LIKE TACT-ACTVT
|
Creates a Planned Record for Cash Settlement Flow | ![]() |
![]() |
![]() |
31 | ![]() |
FTR_FX_COMPBID_MAINTAIN VALUE(I_MODUS) LIKE TACT-ACTVT
|
Finanzgeschäft: Angebot Devisen anlegen/ändern/anzeigen | ![]() |
![]() |
![]() |
32 | ![]() |
FTR_FX_DEAL_MAINTAIN_FROM_DATA VALUE(I_MODUS) LIKE TACT-ACTVT
|
FTR: Create/Change a Foreign Exchange Transaction via Interface | ![]() |
![]() |
![]() |
33 | ![]() |
FTR_FX_SIMULATION_MAINTAIN VALUE(I_MODUS) LIKE TACT-ACTVT
|
FTR: Anlegen Simulation Devisen | ![]() |
![]() |
![]() |
34 | ![]() |
FTR_FX_UL_PREPARE VALUE(I_MODUS) LIKE TACT-ACTVT OPTIONAL
|
Format FX Data for OTC Underlying | ![]() |
![]() |
![]() |
35 | ![]() |
FTR_MM_COMPBID_MAINTAIN VALUE(I_MODUS) LIKE TACT-ACTVT
|
Finanzgeschäft: Angebot Festgeld anlegen/ändern/anzeigen | ![]() |
![]() |
![]() |
36 | ![]() |
FTR_MM_SIMULATION_MAINTAIN VALUE(I_MODUS) LIKE TACT-ACTVT
|
FTR: Anlegen Simulation Festgeld | ![]() |
![]() |
![]() |
37 | ![]() |
FTR_OTC_GET_NEXT_ACTIVITY VALUE(PI_MODUS) TYPE TACT-ACTVT
|
Ermittelt den nächsten Vorgangstyp | ![]() |
![]() |
![]() |
38 | ![]() |
FTR_OTC_GET_NEXT_ACTIVITY_N VALUE(PI_MODUS) TYPE TACT-ACTVT
|
Ermittelt den nächsten Vorgangstyp | ![]() |
![]() |
![]() |
39 | ![]() |
FVD_AUTH_ACTIVITY_TEXT_GET VALUE(I_AKTYP) TYPE TACTT-ACTVT
|
Texte zu Aktivitäten ermitteln | ![]() |
![]() |
![]() |
40 | ![]() |
FVD_BO_API_CHECK_AUTHORITY VALUE(E_FLG_ACTIVITY_ALLOWED) TYPE ACTIV_AUTH
|
API Berechtigungsprüfungen Geschäftsvorfälle mit Initialisierung | ![]() |
![]() |
![]() |
41 | ![]() |
FVD_BO_OL_CHECK_AUTHORITY VALUE(E_FLG_ACTIVITY_ALLOWED) TYPE ACTIV_AUTH
|
Berechtigungsprüfungen zum Geschäftsvorfall | ![]() |
![]() |
![]() |
42 | ![]() |
FVD_CAPTR_UI_CALL_CONTRACT
|
Aufruf Darlehenstammdaten | ![]() |
![]() |
![]() |
43 | ![]() |
FVD_CLI_AUTHORIZATION VALUE(I_ACTVT) TYPE TACT-ACTVT
|
Berechtigungspruefung KLV bearbeiten | ![]() |
![]() |
![]() |
44 | ![]() |
FVD_FICO_AUTH_CHECK VALUE(I_ACTVT) TYPE TACT-ACTVT
|
Berechtigungsprüfung für Pflege der Konditionstableau | ![]() |
![]() |
![]() |
45 | ![]() |
FVD_FICO_AUTH_GET_ACTIVITY_TXT VALUE(I_AKTYP) TYPE TACTT-ACTVT
|
Texte zu Aktivitäten ermitteln | ![]() |
![]() |
![]() |
46 | ![]() |
FVD_FICO_MAINTAIN VALUE(I_AKTYP) TYPE TACT-ACTVT
|
Konditionstableau bearbeiten aus Workflow | ![]() |
![]() |
![]() |
47 | ![]() |
FVD_FICO_V_PROCESS VALUE(I_AKTYP) TYPE TACT-ACTVT
|
Bearbeiten einer Version des Konditionstableaus (mit Dialog) | ![]() |
![]() |
![]() |
48 | ![]() |
FVD_IF_ASS_PRD_WF_MAINTAIN REFERENCE(I_AKTYP) TYPE TACT-ACTVT
|
Freigabe Zuordnung Produkt --> Konditionstableau | ![]() |
![]() |
![]() |
49 | ![]() |
FVD_LOAN_OL_CALL_CONTRACT REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Aufruf der Darlehensstammdaten | ![]() |
![]() |
![]() |
50 | ![]() |
FVD_LOAN_OL_CALL_CONTRACT
|
Aufruf der Darlehensstammdaten | ![]() |
![]() |
![]() |
51 | ![]() |
FVD_LOAN_OL_EXPORT_TO_MEMORY REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Export der Darlehensdaten | ![]() |
![]() |
![]() |
52 | ![]() |
FVD_LOAN_OL_IMPORT_FROM_MEMORY REFERENCE(E_ACTVT) TYPE ACTIV_AUTH
|
Import der Darlehensdaten | ![]() |
![]() |
![]() |
53 | ![]() |
FVD_LOAN_OL_SAVE_FOLM
|
Prüfen und Sichern Finanzobjekt und Limitprüfung | ![]() |
![]() |
![]() |
54 | ![]() |
FVD_LOAN_OL_SAVE_FOLM VALUE(I_ACTVT) TYPE ACTIV_AUTH
|
Prüfen und Sichern Finanzobjekt und Limitprüfung | ![]() |
![]() |
![]() |
55 | ![]() |
FVD_LOCAC_OL_CHECK_GENERAL
|
Daten prüfen | ![]() |
![]() |
![]() |
56 | ![]() |
FVD_PROD_DIA_AUTH_CHECK REFERENCE(I_ACTVT) TYPE TACT-ACTVT
|
Berechtigungsprüfung für Produkte | ![]() |
![]() |
![]() |
57 | ![]() |
FVD_REC_OL_CHECK_AUTH_SAKT REFERENCE(E_FLG_ACTIVITY_ALLOWED) TYPE ACTIV_AUTH
|
Berechtigungsprüfung Akte | ![]() |
![]() |
![]() |
58 | ![]() |
FVD_UI_PRD_ASS_CONTAB_MAINTAIN REFERENCE(I_AKTYP) TYPE TACT-ACTVT
|
Freigabe Zuordnung Produkt --> Konditionstableau | ![]() |
![]() |
![]() |
59 | ![]() |
F_KNA1_BED_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Prüfen der Berechtigung | ![]() |
![]() |
![]() |
60 | ![]() |
F_LFA1_BEK_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Prüfen der Berechtigung | ![]() |
![]() |
![]() |
61 | ![]() |
GET_JOB_HIST_MESSAGE
|
MS SQL server function to get the list of SAP Job History Messages | ![]() |
![]() |
![]() |
62 | ![]() |
GET_JOB_HIST_STEPS
|
MS SQL server function to get the list of SAP Job History Steps | ![]() |
![]() |
![]() |
63 | ![]() |
GJ_GET_COMPANY_CODE_FOR_AUTH VALUE(ACTIVITY) LIKE TACT-ACTVT
|
Get company code with authorization check | ![]() |
![]() |
![]() |
64 | ![]() |
GLE_AUTH_DOC_HEADER VALUE(I_ACTVT) TYPE ACTIV_AUTH DEFAULT '01'
|
Berechtigungsprüfungen für Belegkopf-Ebene | ![]() |
![]() |
![]() |
65 | ![]() |
GLE_AUTH_DOC_ITEM VALUE(I_ACTVT) TYPE ACTIV_AUTH DEFAULT '01'
|
Berechtigungsobjekte für Belegzeilen-Ebene | ![]() |
![]() |
![]() |
66 | ![]() |
GLE_MCA_AUTH_DOC_HEADER REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authority-Check document Header fields | ![]() |
![]() |
![]() |
67 | ![]() |
GLE_MCA_SHLP_EXIT_RUNID_EX
|
Seach Help for Run ID in MCA Reversal or RUN_ADM | ![]() |
![]() |
![]() |
68 | ![]() |
GLE_MCA_SHLP_EXIT_RUNID_RV
|
Seach Help for Run ID in MCA Single Document Reversal | ![]() |
![]() |
![]() |
69 | ![]() |
GL_CHECK_AUTHORITY_SKA1_KTP VALUE(ACTIVITY) LIKE TACTZ-ACTVT
|
Prüfung auf Objekt F_SKA1_KTP (Sachkonto: Berechtigung für Kontenpläne) | ![]() |
![]() |
![]() |
70 | ![]() |
GM_AUTH_CHECK_BUDGET REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authorization for Budget | ![]() |
![]() |
![]() |
71 | ![]() |
GM_AUTH_CHECK_CLASS REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authority for Object Class using Sponsored Class. | ![]() |
![]() |
![]() |
72 | ![]() |
GM_AUTH_CHECK_CLASS_GROUP REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authority for Object Class using Authority Group. | ![]() |
![]() |
![]() |
73 | ![]() |
GM_AUTH_CHECK_DERIVE REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
GM: Authority Check for Derivation Tool | ![]() |
![]() |
![]() |
74 | ![]() |
GM_AUTH_CHECK_DERIVE_ENTRIES REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
GM: Authority Check for Derivation Tool | ![]() |
![]() |
![]() |
75 | ![]() |
GM_AUTH_CHECK_GRANT REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authority for Object Class using Authority Group. | ![]() |
![]() |
![]() |
76 | ![]() |
GM_AUTH_CHECK_GRANT_GROUP REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authority for Object Class using Authority Group. | ![]() |
![]() |
![]() |
77 | ![]() |
GM_AUTH_CHECK_PROGRAM REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authority for Object Class using Sponsored Class. | ![]() |
![]() |
![]() |
78 | ![]() |
GM_AUTH_CHECK_PROGRAM_GROUP REFERENCE(ACTIVITY) TYPE ACTIV_AUTH
|
GM: Check Authority for Object Class using Authority Group. | ![]() |
![]() |
![]() |
79 | ![]() |
GM_GET_BUDGET_DOCUMENT_SINGLE VALUE(I_AUTH_ACTIVITY_GRANT) TYPE ACTIV_AUTH OPTIONAL
|
Get to budget document | ![]() |
![]() |
![]() |
80 | ![]() |
GM_GET_BUDGET_DOCUMENT_SINGLE VALUE(I_AUTH_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Get to budget document | ![]() |
![]() |
![]() |
81 | ![]() |
GM_GET_GRANT_SINGLE VALUE(I_AUTH_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Get grant master and its objects | ![]() |
![]() |
![]() |
82 | ![]() |
GM_GET_SPONSORED_CLASS_SINGLE VALUE(I_AUTH_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Get sponsored class | ![]() |
![]() |
![]() |
83 | ![]() |
GM_GET_SPONSORED_PROG_SINGLE VALUE(I_AUTH_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Get sponsored program | ![]() |
![]() |
![]() |
84 | ![]() |
GM_OM_DISPLAY_CHANGE_DOCUMENT REFERENCE(I_AUTH_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Display Change Documents to Object Mapper | ![]() |
![]() |
![]() |
85 | ![]() |
GRFN_ELA_USR_GET_AUTH
|
Get ELA User Auth | ![]() |
![]() |
![]() |
86 | ![]() |
G_ADMI_AUTHORITY_CHECK VALUE(ACTIVITY) LIKE TACT-ACTVT
|
G_ADMI_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
87 | ![]() |
G_BOOL_AUTHORITY_CHECK_RULES VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Berechtigungen für Rules | ![]() |
![]() |
![]() |
88 | ![]() |
G_BOOL_AUTHORITY_CHECK_SUBST VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Berechtigungen für Substitutions | ![]() |
![]() |
![]() |
89 | ![]() |
G_BOOL_AUTHORITY_CHECK_VALID VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Berechtigungen für Validierungen | ![]() |
![]() |
![]() |
90 | ![]() |
G_DATABASE_AUTHORITY_CHECK VALUE(ACTVT) LIKE AUTHB-ACTVT
|
G_DATABASE_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
91 | ![]() |
G_EXTRACT_AUTHORITY_CHECK
|
ReportWriter: Prüfen der Berechtigung für Aktionen mit Extrakten | ![]() |
![]() |
![]() |
92 | ![]() |
G_EXTRACT_AUTHORITY_CHECK VALUE(I_ACTVT) TYPE ACTIV_AUTH
|
ReportWriter: Prüfen der Berechtigung für Aktionen mit Extrakten | ![]() |
![]() |
![]() |
93 | ![]() |
G_JOB_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Berechtigungspruefung fuer Jobs | ![]() |
![]() |
![]() |
94 | ![]() |
G_LIBRARY_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Bibliothek prüfen | ![]() |
![]() |
![]() |
95 | ![]() |
G_REPORT_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Report-Berechtigung prüfen | ![]() |
![]() |
![]() |
96 | ![]() |
G_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Berechtigungen für Sets | ![]() |
![]() |
![]() |
97 | ![]() |
G_SET_BUF_PREPARE_MODIFICATION REFERENCE(I_ACTIVITY) TYPE TACT-ACTVT DEFAULT '02'
|
Berechtigungsverprobung und Sperren von Sets | ![]() |
![]() |
![]() |
98 | ![]() |
G_SET_OR_GROUP_AUTHORITY REFERENCE(I_ACTVT) TYPE TACT-ACTVT
|
Berechtigungsprüfung für Sets und CO-Gruppen | ![]() |
![]() |
![]() |
99 | ![]() |
G_SYSPAR_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Berechtigungspruefung fuer Jobs | ![]() |
![]() |
![]() |
100 | ![]() |
G_TABLE_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung für Tabellen | ![]() |
![]() |
![]() |
101 | ![]() |
G_VARIABLE_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Berechtigungen für Variablen in Sets | ![]() |
![]() |
![]() |
102 | ![]() |
HAZMAT_AUTH_DGEXCEPT_CHECK REFERENCE(E_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm (GG-Ausnahmen) | ![]() |
![]() |
![]() |
103 | ![]() |
HAZMAT_AUTH_DGTMD_CHECK REFERENCE(E_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm | ![]() |
![]() |
![]() |
104 | ![]() |
HAZMAT_AUTH_MESSAGE_HANDLING VALUE(I_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Ausgabe der Meldungen bei nicht vorhandener Berechtigung | ![]() |
![]() |
![]() |
105 | ![]() |
HAZMAT_AUTH_TEXT_CHECK VALUE(E_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Prüfung auf Berechtigung für Gefahrguttexte | ![]() |
![]() |
![]() |
106 | ![]() |
HF04_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung | ![]() |
![]() |
![]() |
107 | ![]() |
HRFPM_SCHEDMAN_INIT VALUE(I_ACTIVITY) TYPE SCHEDMAN_DETAIL_USER-ACTIVITY DEFAULT '16'
|
Schedman Monitor initialisieren | ![]() |
![]() |
![]() |
108 | ![]() |
HRHAP_0DOC_AUTHORITY_CHECK_N REFERENCE(ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Authority Check (Multiple Documents - Internal Call with Needed Data) | ![]() |
![]() |
![]() |
109 | ![]() |
HRHAP_DOCUMENT_FILL_LIST_XXL REFERENCE(AUTHORITY_ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Appraisal Document Get List | ![]() |
![]() |
![]() |
110 | ![]() |
HRHAP_DOCUMENT_GET_DETAIL
|
Appraisal Document Read | ![]() |
![]() |
![]() |
111 | ![]() |
HRHAP_DOC_AUTHORITY_CHECK REFERENCE(ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Authority Check (Single Document) | ![]() |
![]() |
![]() |
112 | ![]() |
HRHAP_DOC_AUTHORITY_CHECK_N REFERENCE(ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Authority Check (Multiple Documents) | ![]() |
![]() |
![]() |
113 | ![]() |
HRHAP_POPUP_F4_TEMPLATE REFERENCE(AUTHORITY_CHECK) TYPE ACTIV_AUTH DEFAULT '03'
|
F4-Help: Appraisal Template (Released and In History) | ![]() |
![]() |
![]() |
114 | ![]() |
HRHAP_POPUP_TEMPLATE_GET
|
Display/Change/Create Appraisal Document | ![]() |
![]() |
![]() |
115 | ![]() |
HRHAP_RFC_TEMPLATE_GET_LIST VALUE(AUTHORITY_CHECK) TYPE ACTIV_AUTH DEFAULT '03'
|
RFC: Retrieve Templates | ![]() |
![]() |
![]() |
116 | ![]() |
HRHAP_TEMPLATE_CHECK_EXISTENCE REFERENCE(AUTHORITY_CHECK) TYPE ACTIV_AUTH DEFAULT '03'
|
Appraisal Template - Check Existence | ![]() |
![]() |
![]() |
117 | ![]() |
HRHAP_TEMPLATE_GET_LIST REFERENCE(AUTHORITY_CHECK) TYPE ACTIV_AUTH DEFAULT '03'
|
Get List of possible Appraisal Templates (Released) | ![]() |
![]() |
![]() |
118 | ![]() |
HRIQ_AUDF_AUTHORITY_CHECK VALUE(IV_ACTIV) TYPE ACTIV_AUTH
|
Berechtigungsprüfung für Anforderungsprofil | ![]() |
![]() |
![]() |
119 | ![]() |
HRIQ_AUDIT_AUTHORITY_CHECK
|
Berechtigungsprüfung für Anforderungsprüfung | ![]() |
![]() |
![]() |
120 | ![]() |
HRTM_JF_RETRIEVE REFERENCE(AUTHORITY_CHECK) TYPE ACTIV_AUTH DEFAULT '03'
|
Lesen aller Jobfamilien in Abhängigkeit des Status (Ausgabeliste) | ![]() |
![]() |
![]() |
121 | ![]() |
HRTM_JF_RETRIEVE_WD_UI REFERENCE(AUTHORITY_CHECK) TYPE ACTIV_AUTH DEFAULT '03'
|
Job Family Retrieve (WebDynpro) | ![]() |
![]() |
![]() |
122 | ![]() |
HR_HCP_CHECK_AUTHORITY
|
Berechtigungsprüfung | ![]() |
![]() |
![]() |
123 | ![]() |
HR_NL_EDM_EXPAND_JUPER_SEL_OPT REFERENCE(I_ACTVT) TYPE ACTIV_AUTH OPTIONAL
|
HR_NL_EDM_EXPAND_JUPER_SEL_OPT | ![]() |
![]() |
![]() |
124 | ![]() |
HR_NL_LA_EXPAND_JUPER_SEL_OPT REFERENCE(I_ACTVT) TYPE ACTIV_AUTH OPTIONAL
|
HR_NL_LA_EXPAND_JUPER_SEL_OPT | ![]() |
![]() |
![]() |
125 | ![]() |
HSM001_HAZSUB_CREATE
|
EHS: Anlegen von Gef.Stoffstamm Daten | ![]() |
![]() |
![]() |
126 | ![]() |
HSM002_READ_BY_RANGE REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
EHS: Gefahrstoffdaten über dynamische Selektion ermitteln | ![]() |
![]() |
![]() |
127 | ![]() |
HSM004_AUTHORITY_CHECK REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
EHS: Berechtigungsprüfung auf Objekt /EHS3/HMA | ![]() |
![]() |
![]() |
128 | ![]() |
HSM500_CALL_TRANSACTION
|
EHS: Aufruf von Transaktionen | ![]() |
![]() |
![]() |
129 | ![]() |
HSM500_CALL_TRANSACTION REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
EHS: Aufruf von Transaktionen | ![]() |
![]() |
![]() |
130 | ![]() |
ICF_EXECUTE_RECORDER_REQUEST
|
ICF_EXECUTE_RECORDER_REQUEST | ![]() |
![]() |
![]() |
131 | ![]() |
ICLC_AUTHORITY_CHECK_ACT REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung Aufgabe / Protokolleintrag | ![]() |
![]() |
![]() |
132 | ![]() |
ICLC_AUTHORITY_CHECK_CLTYPE REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Schadentyp Berechtigungspruefung | ![]() |
![]() |
![]() |
133 | ![]() |
ICLC_AUTHORITY_CHECK_SUBCLTYPE REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Teilschadentyp Berechtigungspruefung | ![]() |
![]() |
![]() |
134 | ![]() |
ICLC_AUTHORITY_CHECK_SUBOBJECT
|
Berechtigungspruefung Schadenteilobjekt, z.B. Notizen | ![]() |
![]() |
![]() |
135 | ![]() |
ICLC_AUTHORITY_CHECK_SUBOBJECT REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Berechtigungspruefung Schadenteilobjekt, z.B. Notizen | ![]() |
![]() |
![]() |
136 | ![]() |
ICLC_AUTHORITY_CHECK_VIPGROUP REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung VIP-Gruppen | ![]() |
![]() |
![]() |
137 | ![]() |
ICLC_IF_AUTHORITY_CHECK_CLTYPE REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Schadentyp Berechtigungspruefung | ![]() |
![]() |
![]() |
138 | ![]() |
ICLC_IF_AUTH_CHECK_SUBCLTYPE REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Teilschadentyp Berechtigungspruefung | ![]() |
![]() |
![]() |
139 | ![]() |
ICLC_IF_AUTH_CHECK_VIPGROUP REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung VIP-Gruppen | ![]() |
![]() |
![]() |
140 | ![]() |
ICLE_AUTHORITY_CHECK_EVTYPE REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
Schadentyp Berechtigungspruefung | ![]() |
![]() |
![]() |
141 | ![]() |
ICLE_ENQUEUE_CLAIMHEADER
|
Enqueue SAP lock on claim header | ![]() |
![]() |
![]() |
142 | ![]() |
ICLE_ENQUEUE_EVENTHEADER
|
Enqueue SAP lock on claim header | ![]() |
![]() |
![]() |
143 | ![]() |
ICLE_ENQUEUE_SUBCLAIM
|
Enqueue and check authorization of single subclaim | ![]() |
![]() |
![]() |
144 | ![]() |
ICLH_AUTH_CHECK_SUBOBJCAT REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
(obsolet !!) führt Berechtigungsprüfung für Fall-Teilobjekte durch | ![]() |
![]() |
![]() |
145 | ![]() |
ICLH_AUTH_CHECK_SUBOBJCAT
|
(obsolet !!) führt Berechtigungsprüfung für Fall-Teilobjekte durch | ![]() |
![]() |
![]() |
146 | ![]() |
ICLSC_AUTHORITY_CHECK VALUE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung Leistungs-/Gebührenkataloge | ![]() |
![]() |
![]() |
147 | ![]() |
ICL_AUTH_CHECK_DISPATCHER REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
leitet Authority-Check ggfs. an anderes Subobject weiter | ![]() |
![]() |
![]() |
148 | ![]() |
ICL_AUTH_CHECK_FOR_PDOCCAT_BRF
|
Alle Anspruchspostengruppierungen je Typ für BRF holen | ![]() |
![]() |
![]() |
149 | ![]() |
ICL_ENQUEUE_AND_SELECT
|
Authority check, enqueue SAP locks and select claim table | ![]() |
![]() |
![]() |
150 | ![]() |
ICL_ENQUEUE_CLAIMHEADER
|
Enqueue SAP lock on claim header | ![]() |
![]() |
![]() |
151 | ![]() |
ICL_ENQUEUE_SUBCLAIM
|
Enqueue and check authorization of single subclaim | ![]() |
![]() |
![]() |
152 | ![]() |
ICL_IF_PROC_AUTH_CHECK_BADI REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
BadI zur Berechtigungsprüfung von Anspruchsposten aufrufen | ![]() |
![]() |
![]() |
153 | ![]() |
ICL_IF_PROC_SET_STATUS REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Status einer Anspruchspostengruppierung setzen | ![]() |
![]() |
![]() |
154 | ![]() |
ICL_POLICY_AUTH_CHECK
|
prüft Änderungs-Berechtigung für Policy | ![]() |
![]() |
![]() |
155 | ![]() |
ICL_POLICY_AUTH_CHECK REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
prüft Änderungs-Berechtigung für Policy | ![]() |
![]() |
![]() |
156 | ![]() |
ICL_PROC_AUTH_CHECK REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
führt Berechtigungsprüfung für Procurements durch | ![]() |
![]() |
![]() |
157 | ![]() |
ICL_PROC_AUTH_CHECK
|
führt Berechtigungsprüfung für Procurements durch | ![]() |
![]() |
![]() |
158 | ![]() |
ICL_PROC_AUTH_CHECK_BADI REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
BadI zur Berechtigungsprüfung von Anspruchsposten aufrufen | ![]() |
![]() |
![]() |
159 | ![]() |
ICL_PROC_MODIFY REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Anspruchspostengruppierung ändern | ![]() |
![]() |
![]() |
160 | ![]() |
ICL_PROC_MODIFY
|
Anspruchspostengruppierung ändern | ![]() |
![]() |
![]() |
161 | ![]() |
ICL_PROC_SET_STATUS REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Status einer Anspruchspostengruppierung setzen | ![]() |
![]() |
![]() |
162 | ![]() |
ICL_SET_SUBOBJ_AUTH_MESSAGE REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Nachricht zu fehlender Berechtigung in SY-Variablen stellen | ![]() |
![]() |
![]() |
163 | ![]() |
ICL_SUBCL_SET_ACT
|
ICL: Set subclaim information | ![]() |
![]() |
![]() |
164 | ![]() |
ICL_SUBOBJECT_GET
|
Mögliche Fallteilobjekte für Parameter ermitteln | ![]() |
![]() |
![]() |
165 | ![]() |
ICL_TACTT_SELECT_SINGLE REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
Select Single TACTT | ![]() |
![]() |
![]() |
166 | ![]() |
IDOCTYPE_AUTHORITY_CHECK VALUE(PI_ACTIVITY) LIKE EDI_IAPI00-ACTIVITY
|
IDOCTYPE_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
167 | ![]() |
IHC_PAYRQ_AUTH_CHECK VALUE(I_AUTH_CODE) TYPE ACTIV_AUTH
|
authority Check | ![]() |
![]() |
![]() |
168 | ![]() |
IMA_CHECK_AUTHORITY
|
VO: Berechtigungsprüfung für INSOBJECT | ![]() |
![]() |
![]() |
169 | ![]() |
INFO_OBJECTS_AUTHORITY_CHECK VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
INFO_OBJECTS_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
170 | ![]() |
INFO_OBJECTS_CHECK_OUT
|
Export info object | ![]() |
![]() |
![]() |
171 | ![]() |
INFO_OBJECTS_PROPERTY_EDIT
|
Edit info object attributes | ![]() |
![]() |
![]() |
172 | ![]() |
INFO_OBJECT_AUTHORITY_CHECK VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung für ein einzelnes Info-Objekt | ![]() |
![]() |
![]() |
173 | ![]() |
INFO_OBJECT_PROPERTIES_EDIT
|
Edit info object attributes | ![]() |
![]() |
![]() |
174 | ![]() |
IO_AUTH_CHECK_FOR_USER VALUE(ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Berechtigungsprüfung für ein einzelnes Info-Objekt | ![]() |
![]() |
![]() |
175 | ![]() |
IO_C_CHECK_OUT_PREPARE
|
IO_C_CHECK_OUT_PREPARE | ![]() |
![]() |
![]() |
176 | ![]() |
IO_C_PHIOS_AUTHORITY_CHECK VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
IO_C_PHIOS_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
177 | ![]() |
IO_D_LIST_PREPARE
|
IWB: Liste von Info Objekten (mit Attributen) vorbereiten | ![]() |
![]() |
![]() |
178 | ![]() |
IO_D_PHIOS_PROPERTY_EDIT
|
Attribute eines phys. Info-Objektes bearbeiten | ![]() |
![]() |
![]() |
179 | ![]() |
ISCD_BROK_AUTHORITY_CHECK REFERENCE(I_ACTVT) TYPE ACTIV_AUTH OPTIONAL
|
Maklerberechtigung - Prüfung, ob User f. Kunde/Makler authorisiert ist | ![]() |
![]() |
![]() |
180 | ![]() |
ISCD_OP_CHECK_0040 VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
IS-IS-CD 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
181 | ![]() |
ISCD_OP_CHECK_0040_XPMAN VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
IS-IS-CD 0040: Zusatzprüfungen bei Kontokorrentpositionänderung | ![]() |
![]() |
![]() |
182 | ![]() |
ISHMED_CHECK_N_1CORDER VALUE(I_ACTVT) TYPE ACTIV_AUTH
|
IS-H*MED: Berechtigungsprüfung Klinischer Auftrag (N_1CORDER) | ![]() |
![]() |
![]() |
183 | ![]() |
ISHMED_DICTATION_AUTH VALUE(I_ACT) TYPE TACT-ACTVT
|
i.s.h.med: Berechtigungsprüfung Diktate (Ber.objekt N_2DIKTAT) | ![]() |
![]() |
![]() |
184 | ![]() |
ISH_AUTH_CHECK_INVOICE REFERENCE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsobjekt Abrechnung N_INVOICE | ![]() |
![]() |
![]() |
185 | ![]() |
ISH_AUTH_DIAGNOSIS_BLOCK VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung bzgl. Diagnosesperre (Ber.objekt N_NDIA_ORG) | ![]() |
![]() |
![]() |
186 | ![]() |
ISH_AUTH_DIAGNOSIS_CAT VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung bzgl. Dia.schlüssel (Ber.objekt N_NDIA_ORG) | ![]() |
![]() |
![]() |
187 | ![]() |
ISH_AUTH_DIAGNOSIS_INSTIT VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung Diagnosen-Einrichtung (Ber.objekt N_NDIA_ORG) | ![]() |
![]() |
![]() |
188 | ![]() |
ISH_AUTH_DIAGNOSIS_ORGFA VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung Diagnosen-fachl. OE (Ber.objekt N_NDIA_ORG) | ![]() |
![]() |
![]() |
189 | ![]() |
ISH_AUTH_DIAGNOSIS_TYP VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung bzgl. Diagnosentyp (Ber.objekt N_NDIA_ORG) | ![]() |
![]() |
![]() |
190 | ![]() |
ISH_AUTH_DIAGNOSIS_UEB VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung bzgl. Dia.schlüssel (Ber.objekt N_NDIA_ORG) | ![]() |
![]() |
![]() |
191 | ![]() |
ISH_CAPACITY_OFFER_MAINTAIN
|
IS-H: Bearbeitungsoberfläche zur Terminangebotspflege für ein Planobjekt | ![]() |
![]() |
![]() |
192 | ![]() |
ISH_CHECK_DRG_AUTHORITY VALUE(SS_ACT) LIKE TACT-ACTVT
|
IS-H: Berechtigungsprüfung für das Objekt: N_NDRG | ![]() |
![]() |
![]() |
193 | ![]() |
ISH_INVOICE_DOCUMENT_READ VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT ' '
|
IS-H: Fakturabelege lesen | ![]() |
![]() |
![]() |
194 | ![]() |
ISH_N2_DOC_AUTHORITY_CHECK
|
IS-H*MED: Berechtigungsprüfung für einDokument (nur interne Verwndung) | ![]() |
![]() |
![]() |
195 | ![]() |
ISH_NBEW_CHECK_AUTHORITY VALUE(SS_ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
IS-H: Berechtigungsprüfung Bewegung | ![]() |
![]() |
![]() |
196 | ![]() |
ISH_NL_DBC2002_CODE_S REFERENCE(SS_ACTVT) TYPE TACT-ACTVT
|
IS-H NL: Reopen closed DBC | ![]() |
![]() |
![]() |
197 | ![]() |
ISH_NPAP_CHECK_AUTHORITY VALUE(I_ACTVT) TYPE TACT-ACTVT
|
IS-H: Berechtigungsprüfung vorläufiger Patient | ![]() |
![]() |
![]() |
198 | ![]() |
ISH_NPAT_CHECK_AUTHORITY VALUE(SS_ACTVT) LIKE TACT-ACTVT DEFAULT ' '
|
IS-H: Berechtigungsprüfung Patient | ![]() |
![]() |
![]() |
199 | ![]() |
ISH_PLAN_OBJECT_MAINTAIN
|
IS-H: Pflegen von Planobjekten für die Ambulanzdisposition | ![]() |
![]() |
![]() |
200 | ![]() |
ISH_RFC_AUTHORITY_CHECK_API1 VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT '*'
|
IS-H: Check authorization for FM call by RFC | ![]() |
![]() |
![]() |
201 | ![]() |
ISH_SCHEDULING_AUTHORITY_CHECK REFERENCE(SI_ACTIVITY) TYPE ACTIV_AUTH
|
IS-H: Berechtigung für die Besuchsdisposition prüfen | ![]() |
![]() |
![]() |
202 | ![]() |
ISH_SEARCH_PROFILE_CHECK VALUE(SI_ACTIV_AUTH) TYPE ACTIV_AUTH DEFAULT '03'
|
IS-H: Parameter eines Suchmusters prüfen | ![]() |
![]() |
![]() |
203 | ![]() |
ISMAM_CIC_ORDER_MAINTAIN_PREP
|
IS-M/AM: Auftrag zur Bearbeitung/Anzeige vorbereiten | ![]() |
![]() |
![]() |
204 | ![]() |
ISMAM_CONTENTCOMP_AUTH_CHECK REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
Berechtigungen Inhaltskomponente | ![]() |
![]() |
![]() |
205 | ![]() |
ISMAM_INVOICE_AUTH_CHECK REFERENCE(PV_ACTVT) TYPE ACTIV_AUTH
|
IS-M/AM: Berechtigungsprüfung Fakturabeleg | ![]() |
![]() |
![]() |
206 | ![]() |
ISMAM_INVOICE_AUTH_CHECK_BULK REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
IS-M/AM: Massenberechtigungsprüfung Fakturabeleg | ![]() |
![]() |
![]() |
207 | ![]() |
ISMAM_ORDER_AUTH_CHECK REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
IS-M/AM: Berechtigungsprüfung Auftragskopf | ![]() |
![]() |
![]() |
208 | ![]() |
ISMAM_ORDER_AUTH_CHECK_BULK REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
IS-M/AM: Massenberechtigungsprüfung Auftragskopf | ![]() |
![]() |
![]() |
209 | ![]() |
ISMAM_ORDER_ITEM_AUTH_CHECK REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
IS-M/AM: Berechtigungsprüfung Auftragsposition | ![]() |
![]() |
![]() |
210 | ![]() |
ISMAM_ORDER_ITEM_AUTH_CHECK_BU REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
IS-M/AM: Massenberechtigungsprüfung Auftragsposition | ![]() |
![]() |
![]() |
211 | ![]() |
ISM_AUTH_CHECK_BOOKING_UNIT VALUE(PV_ACTVT) LIKE TACT-ACTVT
|
IS-M/AM: Berechtigungsprüfung Belegungseinheit | ![]() |
![]() |
![]() |
212 | ![]() |
ISM_BAPI_007_AUTHORITY_CHECK REFERENCE(PV_ACTIVITY) TYPE ACTIV_AUTH
|
IS-M: Geschäftspartner Berechtigung prüfen | ![]() |
![]() |
![]() |
213 | ![]() |
ISM_BUPA_AUTHORITY_ADDRESS REFERENCE(PV_ACTIVITY) TYPE ACTIV_AUTH
|
IS-M: Berechtigungspüfung Adresse | ![]() |
![]() |
![]() |
214 | ![]() |
ISM_BUPA_AUTHORITY_AUTHGROUP REFERENCE(PV_ACTIVITY) TYPE ACTIV_AUTH
|
IS-M: Berechtigungspüfung auf Berechtigungsgruppe | ![]() |
![]() |
![]() |
215 | ![]() |
ISM_BUPA_AUTHORITY_DEBITOR REFERENCE(PV_ACTIVITY) TYPE ACTIV_AUTH
|
IS-M: Berechtigungspüfung auf Debitor | ![]() |
![]() |
![]() |
216 | ![]() |
ISM_BUPA_AUTHORITY_ROLETYPE REFERENCE(PV_ACTIVITY) TYPE ACTIV_AUTH
|
IS-M: Berechtigungspüfung auf Rollentyp | ![]() |
![]() |
![]() |
217 | ![]() |
ISM_CAS_AUTHORITY_CHECK REFERENCE(PV_ACTVT) TYPE TACT-ACTVT
|
IS/M CAS Authority check | ![]() |
![]() |
![]() |
218 | ![]() |
ISM_DM_AUTHORITY_CHECK REFERENCE(PV_ACTIVITY) TYPE ACTIV_AUTH
|
IS-M DM: Berechtigungsprüfung im RFC | ![]() |
![]() |
![]() |
219 | ![]() |
ISM_SAMPLE_0040 REFERENCE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Beispiel 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
220 | ![]() |
ISM_SD_QEVENT_TEXT_UPDATE REFERENCE(IM_ACTIVITY) TYPE ACTIV_AUTH
|
Update Texte für Event Managment | ![]() |
![]() |
![]() |
221 | ![]() |
ISM_SD_QEVENT_UPDATE REFERENCE(IN_ACTIVITY) TYPE ACTIV_AUTH
|
Update Event managment | ![]() |
![]() |
![]() |
222 | ![]() |
ISM_SD_QEVENT_UPDATE_TABLE_SET REFERENCE(IN_ACTIVITY) TYPE ACTIV_AUTH
|
Update-Tabellen für Event Managment vorbereiten | ![]() |
![]() |
![]() |
223 | ![]() |
ISM_SELECT_SINGLE_TACTT VALUE(ACTVT) LIKE TACTT-ACTVT
|
gepufferte Einzelzugriffe | ![]() |
![]() |
![]() |
224 | ![]() |
ISM_SEPA_MANDATE_GET
|
SEPA: Mandate lesen | ![]() |
![]() |
![]() |
225 | ![]() |
ISM_SEPA_MANDATE_LIST_POPUP
|
SEPA: Auflisten von Mandaten in Pop-Up | ![]() |
![]() |
![]() |
226 | ![]() |
ISPAM_INVOICE_DOCUMENT_READ VALUE(IN_ACTIVITY) LIKE TACT-ACTVT DEFAULT ' '
|
IS-M/AM: Fakturabeleg lesen; Gesamtdatenumfeld herstellen | ![]() |
![]() |
![]() |
227 | ![]() |
ISPAM_INVOICE_DOCUMENT_READ VALUE(OUT_ACTVT) LIKE TACT-ACTVT
|
IS-M/AM: Fakturabeleg lesen; Gesamtdatenumfeld herstellen | ![]() |
![]() |
![]() |
228 | ![]() |
ISP_AUTH_CHECK_POSTAL_FEE_CTR1 VALUE(ACTVT) LIKE TACT-ACTVT
|
IS-PSD: Berechtigungsprüfung Postgebührenkontrolle (LOW-Level, Sparte) | ![]() |
![]() |
![]() |
229 | ![]() |
ISP_AUTH_CHECK_POSTAL_FEE_CTR2 VALUE(ACTVT) LIKE TACT-ACTVT
|
IS-PSD: Berechtigungsprüfung Postgebührenkontrolle (HIGH-Level: SelOpts) | ![]() |
![]() |
![]() |
230 | ![]() |
ISP_AVMHEADER_CALL
|
IS-M/AM: Funktionsbaustein für AVM-Kopfbild | ![]() |
![]() |
![]() |
231 | ![]() |
ISP_INVOICE_DOCUMENT_READ VALUE(ACTIV_E) LIKE TACT-ACTVT
|
IS-PSD: Fakturabelege lesen | ![]() |
![]() |
![]() |
232 | ![]() |
ISP_INVOICE_DOCUMENT_READ VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT ' '
|
IS-PSD: Fakturabelege lesen | ![]() |
![]() |
![]() |
233 | ![]() |
ISP_SERVICE_ACCOUNT_DOC_READ VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT ' '
|
IS-PSD: Abrechnungsbelege lesen | ![]() |
![]() |
![]() |
234 | ![]() |
IST_SAMPLE_0040 REFERENCE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Beispiel 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
235 | ![]() |
IST_SUBSCR1001_PBO_DEPOSIT REFERENCE(I_MODE) LIKE TACT-ACTVT
|
Zusatzfelder Buchen Beleg | ![]() |
![]() |
![]() |
236 | ![]() |
ISU_BR_EVENT_0040 VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Beispiel 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
237 | ![]() |
ISU_EVENT_0040_AR VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Document Checks for Argentina | ![]() |
![]() |
![]() |
238 | ![]() |
ISU_EVENT_0040_PT VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Belegprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
239 | ![]() |
ISU_POSTING_BLOCK_CHECK_0040 REFERENCE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
do not use: will be deleted | ![]() |
![]() |
![]() |
240 | ![]() |
ISU_SAMPLE_0040 REFERENCE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Beispiel 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
241 | ![]() |
ISU_S_PERCEPTION_LINES_CREATE VALUE(I_ACTVT) TYPE TACT-ACTVT DEFAULT '01'
|
Erstellt Perception Dokument | ![]() |
![]() |
![]() |
242 | ![]() |
ISU_S_PERCEPTION_LINES_OLD VALUE(I_ACTVT) TYPE TACT-ACTVT DEFAULT '01'
|
Erstellt Perception Dokument (obsolet, nicht benutzen) | ![]() |
![]() |
![]() |
243 | ![]() |
IWB_AUTHORITY_CHECK_FLD_GROUPS VALUE(ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
IWB_AUTHORITY_CHECK_FLD_GROUPS | ![]() |
![]() |
![]() |
244 | ![]() |
IWB_AUTHORITY_CHECK_FLD_GROUPS
|
IWB_AUTHORITY_CHECK_FLD_GROUPS | ![]() |
![]() |
![]() |
245 | ![]() |
IWB_AUTH_CHECK_FOR_USER VALUE(ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Berechtigungsprüfung für ein einzelnes Info-Objekt | ![]() |
![]() |
![]() |
246 | ![]() |
IWB_FOLDERS_AUTHORITY_CHECK VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
IWB_FOLDERS_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
247 | ![]() |
IWB_FOLDER_AUTHORITY_CHECK VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
IWB_FOLDER_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
248 | ![]() |
IWB_FOLDER_AUTH_USRS_DISPLAY
|
Liste von Benutzern, die Berechtigung für IWB haben | ![]() |
![]() |
![]() |
249 | ![]() |
IWB_FOLDER_AUTH_USRS_DISPLAY VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
Liste von Benutzern, die Berechtigung für IWB haben | ![]() |
![]() |
![]() |
250 | ![]() |
IWB_FOLDER_IA_QUERY
|
Suchen eines Folders - mit Dialog | ![]() |
![]() |
![]() |
251 | ![]() |
IWB_FOLDER_INFO_OBJECTS_GET VALUE(ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
IWB_FOLDER_INFO_OBJECTS_GET | ![]() |
![]() |
![]() |
252 | ![]() |
IWB_IF_AUTHORITY_CHECK_AREA VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung in AREA | ![]() |
![]() |
![]() |
253 | ![]() |
IWB_IF_AUTHORITY_CHECK_FLD_GRP VALUE(ACTIVITY) LIKE TACT-ACTVT OPTIONAL
|
IWB_IF_AUTHORITY_CHECK_FLD_GRP | ![]() |
![]() |
![]() |
254 | ![]() |
IWB_IF_AUTHORITY_CHECK_IOS VALUE(ACTIVITY) LIKE TACT-ACTVT
|
IWB_IF_AUTHORITY_CHECK_IOS | ![]() |
![]() |
![]() |
255 | ![]() |
IWB_STRUCT_AUTHORITY_CHECK VALUE(ACTIVITY) LIKE HIER_TYPES-ACTIVITY
|
Strukturtypindividuelle Berechtigungsprüfung | ![]() |
![]() |
![]() |
256 | ![]() |
JIT03_CHECK_AUTHORITY VALUE(ACTVT_IV) LIKE JITAUTH-ACTVT OPTIONAL
|
JIT: Prüfen der Berechtigungen | ![]() |
![]() |
![]() |
257 | ![]() |
JITOUT03_CHECK_AUTHORITY REFERENCE(ACTVT_IV) TYPE ACTIV_AUTH OPTIONAL
|
Berechtigungsprüfung für Objekt C_JIT_OUT | ![]() |
![]() |
![]() |
258 | ![]() |
JV_ALLOC_MRULE_PBO VALUE(SUBACTION) LIKE TACT-ACTVT
|
Joint venture allocation manipulation rule - PBO | ![]() |
![]() |
![]() |
259 | ![]() |
JV_AUTHORITY_CHECK_CUSTOMIZE VALUE(ACTIVITY) LIKE TACT-ACTVT
|
Check authority for JVA customizing | ![]() |
![]() |
![]() |
260 | ![]() |
JV_AUTHORITY_CHECK_JOA VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT SPACE
|
Check authority for Joint Operating Agreement master data | ![]() |
![]() |
![]() |
261 | ![]() |
JV_AUTHORITY_CHECK_PROCESS VALUE(ACTIVITY) LIKE TACT-ACTVT
|
Check authority for JVA process | ![]() |
![]() |
![]() |
262 | ![]() |
JV_AUTHORITY_CHECK_REP VALUE(ACTIVITY) LIKE TACT-ACTVT
|
Check authority for reporting | ![]() |
![]() |
![]() |
263 | ![]() |
JV_AUTHORITY_CHECK_VNT VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT SPACE
|
Check authority for Venture master | ![]() |
![]() |
![]() |
264 | ![]() |
JV_MD_CREATE_CHANGE_DOCUMENT REFERENCE(P_MODE) LIKE TACT-ACTVT
|
Create masterdata change document | ![]() |
![]() |
![]() |
265 | ![]() |
JV_MD_DATABASE_UPDATE REFERENCE(I_MODE) LIKE TACT-ACTVT
|
updates all masterdata JOA's | ![]() |
![]() |
![]() |
266 | ![]() |
JV_MD_JOA_VALIDATE REFERENCE(P_MODE) LIKE TACT-ACTVT
|
Validate JOA information | ![]() |
![]() |
![]() |
267 | ![]() |
JV_MD_UPDATE_JOA REFERENCE(I_MODE) LIKE TACT-ACTVT
|
update change history | ![]() |
![]() |
![]() |
268 | ![]() |
JV_MD_VALIDATE_EQUITY_GROUP REFERENCE(I_MODE) LIKE TACT-ACTVT
|
Validate equity group | ![]() |
![]() |
![]() |
269 | ![]() |
J_3G_SHIPMENT_CREATE VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Create Shipping Document | ![]() |
![]() |
![]() |
270 | ![]() |
J_3G_SHIPMENT_CREATE_MIN VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
Create Shipping Document by Transferring Minimal Number of Necessary Field | ![]() |
![]() |
![]() |
271 | ![]() |
J_3G_SHIPMENT_HEAD_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Shipping Document: Checks on Header level | ![]() |
![]() |
![]() |
272 | ![]() |
KAUF_ORDER_READ VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '03'
|
Innenauftrag lesen | ![]() |
![]() |
![]() |
273 | ![]() |
KAUF_ORDER_READ_MULTI VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '03'
|
Mehrere Innenaufträge in Puffer einlesen | ![]() |
![]() |
![]() |
274 | ![]() |
KAUF_RWIN_CALL VALUE(I_ACTVT) LIKE KAUF-PAR_ACTVT
|
RWIN-Aufruf für Zeitpunkt 'AUFTRAG' 'PRUEFEN' | ![]() |
![]() |
![]() |
275 | ![]() |
KBLS_DOC_TYPE_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung: Belegart für Manuelle Mittelreservierung | ![]() |
![]() |
![]() |
276 | ![]() |
KFPRC_PCA_AUTHORITY_CHECK REFERENCE(I_ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung: Planung auf Profit-Center | ![]() |
![]() |
![]() |
277 | ![]() |
KFPRS_DOC_TYPE_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung: Belegart für Festpreisvereinbarungen | ![]() |
![]() |
![]() |
278 | ![]() |
KK_F_PKOSA_AUTHORITY VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung Produktionskostensammler ( K_PKSA ) | ![]() |
![]() |
![]() |
279 | ![]() |
KNVV_BEGRU_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Prüfen des Feldes knvv-begru | ![]() |
![]() |
![]() |
280 | ![]() |
K_ABC_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT OPTIONAL
|
Berechtigungsprüfung Geschäftsprozesse | ![]() |
![]() |
![]() |
281 | ![]() |
K_ALLOCATIONS_MRULE_SUBSCREEN VALUE(ACTION_TYPE) LIKE TACT-ACTVT
|
Allocation: Subscreen-Exit Zykluspflege | ![]() |
![]() |
![]() |
282 | ![]() |
K_ALLOC_TEMPLATE_SUBSCREEN_PBO VALUE(SUBACTION) LIKE TACT-ACTVT
|
Allocation: Template zu Subscreen-Exit PBO | ![]() |
![]() |
![]() |
283 | ![]() |
K_AUFK_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization validation for order groups | ![]() |
![]() |
![]() |
284 | ![]() |
K_CBPR_PLA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
K_CBPR_PLA_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
285 | ![]() |
K_CBPR_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
_ | ![]() |
![]() |
![]() |
286 | ![]() |
K_CKBS_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Berechtigungsprüfung für Stammdaten Musterkalkulation | ![]() |
![]() |
![]() |
287 | ![]() |
K_CKPH_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for cost center groups | ![]() |
![]() |
![]() |
288 | ![]() |
K_COST_OBJECT_ATTACH_ITEMS VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '03'
|
CO-PC: Zuordnung von Einzelobjekten zu einem Kostenträger | ![]() |
![]() |
![]() |
289 | ![]() |
K_COST_OBJECT_PROCESS VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '03'
|
CO-PC: Kostenträger-Stammdaten bearbeiten | ![]() |
![]() |
![]() |
290 | ![]() |
K_CSKA_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for cost element groups | ![]() |
![]() |
![]() |
291 | ![]() |
K_CSKB_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for the cost element master | ![]() |
![]() |
![]() |
292 | ![]() |
K_CSKB_PLA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for cost element planning | ![]() |
![]() |
![]() |
293 | ![]() |
K_CSKS_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for the cost center master | ![]() |
![]() |
![]() |
294 | ![]() |
K_CSKS_BUD_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for cost center budget planning | ![]() |
![]() |
![]() |
295 | ![]() |
K_CSKS_PLA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for cost center planning | ![]() |
![]() |
![]() |
296 | ![]() |
K_CSKS_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for cost center groups | ![]() |
![]() |
![]() |
297 | ![]() |
K_CSLA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for the activity type master | ![]() |
![]() |
![]() |
298 | ![]() |
K_CSLA_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for activity type groups | ![]() |
![]() |
![]() |
299 | ![]() |
K_GROUP_CREATE
|
Anlegen einer neuen Gruppe mit einer Menge von Stammdaten | ![]() |
![]() |
![]() |
300 | ![]() |
K_HIERARCHY_UPDATE VALUE(E_MODE) LIKE TACT-ACTVT DEFAULT '01'
|
Verbuchungsbaustein: Sichern Hierarchie in Gruppenpflege | ![]() |
![]() |
![]() |
301 | ![]() |
K_KA03_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for the statistical total key master | ![]() |
![]() |
![]() |
302 | ![]() |
K_KA03_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for statistical total key groups | ![]() |
![]() |
![]() |
303 | ![]() |
K_KOSTL_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Authorization check for cost centers | ![]() |
![]() |
![]() |
304 | ![]() |
K_MD_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT
|
Check Authorization for SELECT Command | ![]() |
![]() |
![]() |
305 | ![]() |
K_MONITOR_RECORD_OPEN VALUE(I_ACTIVITY) LIKE PFLOG-ACTIVITY OPTIONAL
|
Period End Partner: Eintrag eines Hauptschrittes | ![]() |
![]() |
![]() |
306 | ![]() |
K_ORDER_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Berechtigungsprüfung für Innenaufträge | ![]() |
![]() |
![]() |
307 | ![]() |
K_ORDER_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT '02'
|
Check Request | ![]() |
![]() |
![]() |
308 | ![]() |
K_ORDER_CHECK_SET VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT '02'
|
Gültige Aufträge zu einem Auftragsset ermitteln und puffern | ![]() |
![]() |
![]() |
309 | ![]() |
K_ORDER_LOGSYSTEM_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '03'
|
Prüfung, ob für Auftrag/Aktivität im aktuellen System erl. | ![]() |
![]() |
![]() |
310 | ![]() |
K_ORGUNIT_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Berechtigungsprüfung auf Organisationseinheitenebene | ![]() |
![]() |
![]() |
311 | ![]() |
K_PCAP_SET_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for profit center groups | ![]() |
![]() |
![]() |
312 | ![]() |
K_PCA_RESP_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
EC-PCA: Berechtigungsprüfung auf Verantwortungsbereich | ![]() |
![]() |
![]() |
313 | ![]() |
K_PCA_RESP_AUTHOR_CHECK_RANGE VALUE(I_ACTVT) LIKE TACT-ACTVT
|
EC-PCA-Berechtigungsprüfung auf Verantw. für PrCtr-Ranges-Tab. | ![]() |
![]() |
![]() |
314 | ![]() |
K_PRPS_SET_AUTHORITY_CHECK VALUE(ACTVT) TYPE ACTIV_AUTH DEFAULT SPACE
|
Berechtigungsprüfung zu Auftragsgruppen | ![]() |
![]() |
![]() |
315 | ![]() |
K_REPO_CCA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for reporting on cost center / cost element | ![]() |
![]() |
![]() |
316 | ![]() |
K_REPO_OPA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for reporting on order type/cost element | ![]() |
![]() |
![]() |
317 | ![]() |
K_REPO_PCA_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Check authorization for CoCde/PrCtr in information system | ![]() |
![]() |
![]() |
318 | ![]() |
K_SET_HIERARCHY_MAINTENANCE VALUE(E_MODE) LIKE TACT-ACTVT DEFAULT '01'
|
hierarchische Setpflege | ![]() |
![]() |
![]() |
319 | ![]() |
K_SET_HIERARCHY_MAINTENANCE REFERENCE(E_SIM_MODE) LIKE TACT-ACTVT OPTIONAL
|
hierarchische Setpflege | ![]() |
![]() |
![]() |
320 | ![]() |
K_TABLE_AUTHORITY VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '03'
|
Prüfung, ob Tabellenanzeige/-pflege erlaubt (über S_TABU_DIS) | ![]() |
![]() |
![]() |
321 | ![]() |
K_VERSN_READ VALUE(I_ACTVT) LIKE TACT-ACTVT OPTIONAL
|
Read Plan Version + Fiscal Year-Dependent Version Parameters (if necess.) | ![]() |
![]() |
![]() |
322 | ![]() |
K_VRGNG_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
Authorization check for actual postings and planned offsetting | ![]() |
![]() |
![]() |
323 | ![]() |
K_WORKSPACE_CONTAINER_2_FOLDER
|
Aendern von Arbeitsvorraeten <-> Arbeitsvorratsmappen | ![]() |
![]() |
![]() |
324 | ![]() |
K_WORKSPACE_READ
|
Lesen von Arbeitsvorraeten bzw. Arbeitsvorratsmappen | ![]() |
![]() |
![]() |
325 | ![]() |
MATERIAL_AUTHORITY_CHECK VALUE(TACT_ACTVT) LIKE TACT-ACTVT
|
Berechtigungsprüfung zum Material (von externer Funktion) | ![]() |
![]() |
![]() |
326 | ![]() |
MDG_LG_AUTHORITY_CHECK REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Berechtigungsprüfung | ![]() |
![]() |
![]() |
327 | ![]() |
ME_CPP_AUTH_CHECK_BESWK VALUE(IF_ACTIVITY) LIKE TACT-ACTVT
|
Prüfen der Berechtigung | ![]() |
![]() |
![]() |
328 | ![]() |
MICK_MOVE_TYPE_CHECK VALUE(I_ACTIVITY) LIKE TACT-ACTVT OPTIONAL
|
Enjoy MMIM: Check Movement type (T156, T158B and authority checks) | ![]() |
![]() |
![]() |
329 | ![]() |
MICK_PLANT_CHECK VALUE(I_ACTIVITY) LIKE TACT-ACTVT OPTIONAL
|
Enjoy MMIM: Check Plant (T001W, T159L, T001K, T001 and authority checks) | ![]() |
![]() |
![]() |
330 | ![]() |
MMPUR_AUTHORITY_CHECK_EBAN REFERENCE(PI_ACTVT) TYPE TACT-ACTVT OPTIONAL
|
Berechtigungen Bestellanforderung (EBAN) | ![]() |
![]() |
![]() |
331 | ![]() |
MMPUR_AUTHORITY_CHECK_HEADER REFERENCE(PI_ACTVT) TYPE TACT-ACTVT OPTIONAL
|
Berechtigungsprüfung Kopfdaten (EKKO) | ![]() |
![]() |
![]() |
332 | ![]() |
MMPUR_AUTHORITY_CHECK_ITEM REFERENCE(PI_ACTVT) TYPE TACT-ACTVT OPTIONAL
|
Berechtigungsprüfung Position (EKPO) | ![]() |
![]() |
![]() |
333 | ![]() |
MM_MAINTAIN_EXTERIOR_PAYMENT VALUE(I_AKTYP) LIKE TACT-ACTVT DEFAULT '03'
|
Zusatzdaten für Auslandszahlungen anzeigen oder ändern | ![]() |
![]() |
![]() |
334 | ![]() |
MONI_AUTHORITY_CHECK REFERENCE(ACTVT) TYPE TACT-ACTVT
|
MONI_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
335 | ![]() |
MPO_CCMON_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
MPO: Berechtigungsverprobung auf Kostenstelle/-gruppe/Kostenart/-gruppe | ![]() |
![]() |
![]() |
336 | ![]() |
MPO_ORDMON_AUTHORITY_CHECK VALUE(ACTVT) LIKE TACT-ACTVT DEFAULT SPACE
|
MPO: Berechtigungsverprobung auf Auftrag/-gruppe/Kostenart/-gruppe | ![]() |
![]() |
![]() |
337 | ![]() |
MRM_AUTHORITY_CHECK
|
Berechtigung für WERKE prüfen | ![]() |
![]() |
![]() |
338 | ![]() |
MSS_CHECK_VENDOR_BACKUP_TOOL
|
MSS: Function to check for vendor backup tools | ![]() |
![]() |
![]() |
339 | ![]() |
MSS_ENA_DIS_VENDOR_BACKUP_TOOL
|
MSS: Enable/Disable vendor backup tools | ![]() |
![]() |
![]() |
340 | ![]() |
MSS_GET_CHECKDBHISTORY_FILES
|
To get CheckdbHistory Files | ![]() |
![]() |
![]() |
341 | ![]() |
MSS_GET_JOB_AND_HISTORY_INFO
|
Function to get job and history info | ![]() |
![]() |
![]() |
342 | ![]() |
MSS_GET_JOB_HEADERS
|
Function to get job history header information | ![]() |
![]() |
![]() |
343 | ![]() |
MSS_GET_JOB_INFO_AND_LOG
|
Function to get job and history info of a job | ![]() |
![]() |
![]() |
344 | ![]() |
MSS_JOB_ADD_BATCH
|
MSS: Function to add sql job from new DB13 | ![]() |
![]() |
![]() |
345 | ![]() |
MSS_JOB_DELETE_BATCH
|
MSS: Function to delete Sql job from DBACOCKPIT(DB13) | ![]() |
![]() |
![]() |
346 | ![]() |
MSS_JOB_PREVIEW
|
MSS: Function to add sql job from new DB13 | ![]() |
![]() |
![]() |
347 | ![]() |
MSS_JOB_STOP_BATCH
|
MSS: Function to delete Sql job from DBACOCKPIT(DB13) | ![]() |
![]() |
![]() |
348 | ![]() |
MSS_START_JOB
|
Start a SQL Agent Job | ![]() |
![]() |
![]() |
349 | ![]() |
MS_AUTHORITY_CHECK VALUE(I_ACTIVITY) LIKE TACT-ACTVT
|
Berechtigungsprüfung Erfassungsblatt | ![]() |
![]() |
![]() |
350 | ![]() |
MY_AFTER_INPUT_PROCESS VALUE(I_ACTVT) LIKE SNIWE-ACTVT
|
Generelle Routine nach Startbild | ![]() |
![]() |
![]() |
351 | ![]() |
MY_VALUATION_AREAS_GET VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Ermitteln der LIFO- und FIFO-Ebenen aus Buchungskreis und Bewertungskreis | ![]() |
![]() |
![]() |
352 | ![]() |
OIJB_CHECK_STATFIELDS VALUE(ACTIVITY) TYPE TACT-ACTVT
|
Set Administration fields of TSW Structures | ![]() |
![]() |
![]() |
353 | ![]() |
OIJB_GET_NOMINATION_DATA VALUE(ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
Read Nomination Data of TSW Tickets | ![]() |
![]() |
![]() |
354 | ![]() |
OIJB_TICKET_AUTHORIZE REFERENCE(IV_ACTIVITY) TYPE TACT-ACTVT
|
Authorize ticket data access | ![]() |
![]() |
![]() |
355 | ![]() |
OIJB_TICKET_DEFAULTING VALUE(IV_ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
Default ticket data (header & item) | ![]() |
![]() |
![]() |
356 | ![]() |
OIJB_VALIDATE_TICKET_EVENTS VALUE(ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
OIL-TSW: validate TSW Ticket Events | ![]() |
![]() |
![]() |
357 | ![]() |
OIJB_VALIDATE_TICKET_HEADER VALUE(ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
OIL-TSW: Validate TSW Ticket Header | ![]() |
![]() |
![]() |
358 | ![]() |
OIJB_VALIDATE_TICKET_ITEM VALUE(ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
OIL-TSW: Validate TSW Ticket Item | ![]() |
![]() |
![]() |
359 | ![]() |
OIJB_VALIDATE_TICKET_MULTIPLE VALUE(ACTIVITY) TYPE TACT-ACTVT OPTIONAL
|
OIL-TSW: Validate TSW Ticket Items (multiple) | ![]() |
![]() |
![]() |
360 | ![]() |
OIJ_NOMST_AUTHORIZE REFERENCE(IV_ACTIVITY) TYPE TACT-ACTVT
|
Authorize nomination data access | ![]() |
![]() |
![]() |
361 | ![]() |
OPEN_FI_PERFORM_00010123_P VALUE(I_XACTIVITY) TYPE TACT-ACTVT
|
PO: Determine Relevance Of Receiver Items Check | ![]() |
![]() |
![]() |
362 | ![]() |
OPEN_FI_PERFORM_00010126_E REFERENCE(I_ACTIVITY) TYPE TBKKI_02A-AKTYP
|
Process Item: Exclude Additional Function Codes | ![]() |
![]() |
![]() |
363 | ![]() |
OPEN_FI_PERFORM_00010210_E VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Dialog Payment Item: Authorization Check | ![]() |
![]() |
![]() |
364 | ![]() |
OPEN_FI_PERFORM_00010410_E VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Dialog Payment Order: Authorization Check | ![]() |
![]() |
![]() |
365 | ![]() |
OPEN_FI_PERFORM_00010411_E VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Dialog Standing Order: Authorization Check | ![]() |
![]() |
![]() |
366 | ![]() |
OPEN_FI_PERFORM_00010950_E VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Check Management: Authorization Check | ![]() |
![]() |
![]() |
367 | ![]() |
OPEN_FI_PERFORM_00011040_E VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Account Master Data: Authorization Check | ![]() |
![]() |
![]() |
368 | ![]() |
OPEN_FI_PERFORM_UPS00020_E REFERENCE(IM_ACTVTY) TYPE ACTIV_AUTH
|
BTE : Berechtigungsprüfung UPS | ![]() |
![]() |
![]() |
369 | ![]() |
OXT_AUTHORITY_CHECK VALUE(IV_ACTVT) TYPE ACTIV_AUTH
|
Berechtigungsprüfung für Object Extension | ![]() |
![]() |
![]() |
370 | ![]() |
PA_DD_MULTI_PACKAGE_CHECK
|
PA_DD_MULTI_PACKAGE_CHECK | ![]() |
![]() |
![]() |
371 | ![]() |
PCA_AUTHORITY_CHECK_SELTABLE VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Berechtigungverprobung PCA-Daten anhand der Selektionsbedingungen | ![]() |
![]() |
![]() |
372 | ![]() |
POC_CALL_VIEWCLUSTER REFERENCE(IV_POC_DEFN_ACTIVITY) TYPE ACTIV_AUTH
|
Call View Cluster with Authorization | ![]() |
![]() |
![]() |
373 | ![]() |
PRGN_AUTH_ASSIGN_USERS_TO_AGR
|
Authority-Check für Benutzerzuordnung zur Rolle | ![]() |
![]() |
![]() |
374 | ![]() |
PROCESS_MESSAGE_CHCK_AUTHORITY VALUE(ACTIVITY) LIKE TACT-ACTVT
|
Berechtigungsprüfungen zu Prozeßmeldungen | ![]() |
![]() |
![]() |
375 | ![]() |
PSA_CHECK_PROC_AUTHORITY REFERENCE(ACTVT) LIKE TACT-ACTVT
|
Authorities for PSA | ![]() |
![]() |
![]() |
376 | ![]() |
PSA_CHECK_REP_AUTHORITY REFERENCE(ACTVT) LIKE TACT-ACTVT
|
Report Authority for PSA | ![]() |
![]() |
![]() |
377 | ![]() |
PSM_AUTH_CHECK_DRULE VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
Authorization check: F_PSM_DRUL | ![]() |
![]() |
![]() |
378 | ![]() |
PSM_AUTH_CHECK_DRULE VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Authorization check: F_PSM_DRUL | ![]() |
![]() |
![]() |
379 | ![]() |
PSM_AUTH_CHECK_DSTR VALUE(I_ACTVT_A) LIKE TACT-ACTVT OPTIONAL
|
Authorization check: F_PSM_DRUL | ![]() |
![]() |
![]() |
380 | ![]() |
PSM_AUTH_CHECK_DSTR VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Authorization check: F_PSM_DRUL | ![]() |
![]() |
![]() |
381 | ![]() |
READ_HAUPTBUCH VALUE(AUTH_CHECK_ACTIVITY) LIKE TACT-ACTVT DEFAULT SPACE
|
Lesen von Kontenplan und Sachkonto | ![]() |
![]() |
![]() |
382 | ![]() |
REXA_CALLBACK_EVENT_0040 VALUE(I_ACTVT) LIKE TACT-ACTVT DEFAULT '01'
|
FI-CA extended Event 0040: Zusatzprüfungen für eine Kontokorrentposition | ![]() |
![]() |
![]() |
383 | ![]() |
REXA_CALLBACK_EVENT_6505 REFERENCE(I_ACTVT) TYPE ACTIV_AUTH DEFAULT SPACE
|
Muster: Eingabe Anordnungspositionen prüfen | ![]() |
![]() |
![]() |
384 | ![]() |
RKE_CUS_HIER_AUTH_CHECK VALUE(ACTIVITY) LIKE HIER_TYPES-ACTIVITY
|
Kopiervorlage für strukturtypindividuelle Berechtigungsprüfung | ![]() |
![]() |
![]() |
385 | ![]() |
RKE_PLA_CORE_AUTHORITY_CHECK
|
Authority check CO-PA | ![]() |
![]() |
![]() |
386 | ![]() |
RLB_LIBRARY_TREE_AUTHORITY VALUE(ACTIVITY) LIKE HIER_TYPES-ACTIVITY
|
ReUse-Library: strukturtypindividuelle Berechtigungsprüfung | ![]() |
![]() |
![]() |
387 | ![]() |
RLB_PRODUCT_TREE_AUTHORITY VALUE(ACTIVITY) LIKE HIER_TYPES-ACTIVITY
|
ReUse-Library: strukturtypindividuelle Berechtigungsprüfung | ![]() |
![]() |
![]() |
388 | ![]() |
RMSA901_CHECK_AUTHORIZATION
|
Berechtigungsprüfung C_RMS_MCH | ![]() |
![]() |
![]() |
389 | ![]() |
RMXT149_CHECK_AUTHORITY REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Berechtigungsprüfung für Versuche | ![]() |
![]() |
![]() |
390 | ![]() |
RM_CHAR_SORT_WINDOW REFERENCE(I_MODE) LIKE TACT-ACTVT
|
RM: Festlegung der Reihenfolge der RM-Merkmale in einem eigenen Fenster | ![]() |
![]() |
![]() |
391 | ![]() |
RM_PHS_SELECT_ACT REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
RM. Portfoliohierarchien und Texte für eine Aktivität | ![]() |
![]() |
![]() |
392 | ![]() |
RM_PH_AUTH_CHECK VALUE(I_ACTVT) LIKE VTVAUTHA-ACTVT
|
RM: Berechtigungsprüfung für eine Portfoliohierarchie | ![]() |
![]() |
![]() |
393 | ![]() |
RPM_CHECK_AUTHORITY VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
Check authority | ![]() |
![]() |
![]() |
394 | ![]() |
RPM_GET_PROJECT_AUTHORIZATION VALUE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
Get the authorization for project for various activities | ![]() |
![]() |
![]() |
395 | ![]() |
RPM_MIGRATION_CATEGORY_ACL VALUE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
xRPM Migration: Build ACL from authorization profiles | ![]() |
![]() |
![]() |
396 | ![]() |
RRMX_WORKBOOK_QUERIES_GET VALUE(I_ACTVT) LIKE AUTHB-ACTVT OPTIONAL
|
Get all the queries that appear in a Workbook | ![]() |
![]() |
![]() |
397 | ![]() |
RRS_REPORT_INIT_CHECK REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH DEFAULT '03'
|
Verification and Completion of Variable Values | ![]() |
![]() |
![]() |
398 | ![]() |
RSA1_DSOURCE_AUTHORITY_CHECK
|
Berechtigungsprüfung DataSource (OSOA/OSOD): S_RO_OSOA | ![]() |
![]() |
![]() |
399 | ![]() |
RSAU_WRITE_ICF_AUDIT_LOG VALUE(ACTIVITY) TYPE ACTIV_AUTH
|
Schreiben eines Auditeintrags bei Report-Submit | ![]() |
![]() |
![]() |
400 | ![]() |
RSBK_DTP_MAINTAIN
|
Maintainance dynpro data transfer process | ![]() |
![]() |
![]() |
401 | ![]() |
RSB_GUI_MAINTAIN_OHD
|
Processing of the new Open Hub Destination | ![]() |
![]() |
![]() |
402 | ![]() |
RSDAS_X_PROCESS
|
Running a Data Access Service | ![]() |
![]() |
![]() |
403 | ![]() |
RSDDG_AUTHY_CHECK REFERENCE(I_ACTVT) TYPE AUTHB-ACTVT
|
Authorization Check | ![]() |
![]() |
![]() |
404 | ![]() |
RSDG_SOURSYSTEM_MAINTAIN
|
Master Data Maintenance of InfoObject 0SOURSYSTEM (RSSOURSYSTEM) | ![]() |
![]() |
![]() |
405 | ![]() |
RSDMDD_DELETE_MASTER_DATA
|
Packetized delete master data | ![]() |
![]() |
![]() |
406 | ![]() |
RSDMD_MDMT
|
Module for the maintenance of master data attributes and texts (generic.) | ![]() |
![]() |
![]() |
407 | ![]() |
RSD_IPROP_MAINTAIN
|
Maintain InfoProvider Properties | ![]() |
![]() |
![]() |
408 | ![]() |
RSEC_AUTHORITY_CHECK_IPROV REFERENCE(I_ACTVT) TYPE ACTIV_AUTH DEFAULT '03'
|
InfoProvider, Activity and Validity Check | ![]() |
![]() |
![]() |
409 | ![]() |
RSEC_AUTHORITY_CHECK_SELECTION VALUE(I_ACTIVITY) TYPE ACTIV_AUTH OPTIONAL
|
Analysis Authorization Check | ![]() |
![]() |
![]() |
410 | ![]() |
RSEC_AUTHORITY_CHECK_SELECTION
|
Analysis Authorization Check | ![]() |
![]() |
![]() |
411 | ![]() |
RSEC_F4HELP_CHAVL
|
Input Help for Characteristic Values | ![]() |
![]() |
![]() |
412 | ![]() |
RSEC_USER_INTERFACE REFERENCE(I_ACTION) TYPE ACTIV_AUTH
|
BI AS: Interface for Processing Authorizations for Reporting Users | ![]() |
![]() |
![]() |
413 | ![]() |
RSINP_RSDMD_MDMT
|
Copy of the function module RSDMD_MDMT | ![]() |
![]() |
![]() |
414 | ![]() |
RSKS_MAINTAIN_KS
|
Maintain New InfoSource | ![]() |
![]() |
![]() |
415 | ![]() |
RSLG_MAINTAIN_MSG
|
Allgemeiner Pflegedialog für SysLog-Meldungen | ![]() |
![]() |
![]() |
416 | ![]() |
RSLG_MAINTAIN_MSG REFERENCE(ID_ACTVT) TYPE ACTIV_AUTH DEFAULT '03'
|
Allgemeiner Pflegedialog für SysLog-Meldungen | ![]() |
![]() |
![]() |
417 | ![]() |
RSOD_BIRM_IS_AUTH_FOR_PROP VALUE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Checks whether a user is authorized for properties | ![]() |
![]() |
![]() |
418 | ![]() |
RSOD_BIRM_IS_AUTH_FOR_RESOURCE VALUE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Checks if user is authorized for document | ![]() |
![]() |
![]() |
419 | ![]() |
RSO_AGGR_ACTIVATE_CONTENT
|
BW Repository: copies and activates aggregates from the delivery vers | ![]() |
![]() |
![]() |
420 | ![]() |
RSO_CTC_AUTHORITY_CHECK
|
Berechtigungsprüfung für CTC RFC Bausteine | ![]() |
![]() |
![]() |
421 | ![]() |
RSO_CUBE_ACTIVATE_CONTENT
|
BW Repository: Aktivierung InfoCube aus der Auslieferungsversion | ![]() |
![]() |
![]() |
422 | ![]() |
RSO_IOBC_ACTIVATE_CONTENT
|
BW Repository: Activation of InfoObject Catalog from Delivery Version | ![]() |
![]() |
![]() |
423 | ![]() |
RSO_MORM_CHECK_AUTHORITY VALUE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Authority check | ![]() |
![]() |
![]() |
424 | ![]() |
RSO_RRCA_ACTIVATE_CONTENT
|
BW Repository: Copies and Activates InfoObjects from Delivery Version | ![]() |
![]() |
![]() |
425 | ![]() |
RSO_RRQA_ACTIVATE_CONTENT
|
BW Repository: Copies and Activates InfoObjects from Delivery Version | ![]() |
![]() |
![]() |
426 | ![]() |
RSPLSSOB_SELOBJ_AUTH_CHECK VALUE(I_ACTVT) TYPE ACTIV_AUTH DEFAULT 02
|
Authorization Check for Components | ![]() |
![]() |
![]() |
427 | ![]() |
RSPLW_VAR_EDIT
|
Create Variables | ![]() |
![]() |
![]() |
428 | ![]() |
RSSB_AUTHORITY_ADMWB_ALVL REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Protection Aggregation Level | ![]() |
![]() |
![]() |
429 | ![]() |
RSSB_AUTHORITY_ADMWB_CTT REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Protection InfoSet | ![]() |
![]() |
![]() |
430 | ![]() |
RSSB_AUTHORITY_ADMWB_DS REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
431 | ![]() |
RSSB_AUTHORITY_ADMWB_DTA REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization data targets: InfoCubes and ODS Objects | ![]() |
![]() |
![]() |
432 | ![]() |
RSSB_AUTHORITY_ADMWB_DTP REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
433 | ![]() |
RSSB_AUTHORITY_ADMWB_HCPR REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Protection InfoSet | ![]() |
![]() |
![]() |
434 | ![]() |
RSSB_AUTHORITY_ADMWB_HIERARCHY REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Protection Hierarchy | ![]() |
![]() |
![]() |
435 | ![]() |
RSSB_AUTHORITY_ADMWB_INFOCUBE REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection InfoCube | ![]() |
![]() |
![]() |
436 | ![]() |
RSSB_AUTHORITY_ADMWB_INFOSET REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Protection InfoSet | ![]() |
![]() |
![]() |
437 | ![]() |
RSSB_AUTHORITY_ADMWB_IOBC REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection InfoObjectCatalog | ![]() |
![]() |
![]() |
438 | ![]() |
RSSB_AUTHORITY_ADMWB_IOBJ REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Protection InfoObject | ![]() |
![]() |
![]() |
439 | ![]() |
RSSB_AUTHORITY_ADMWB_ISOURCE REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization for InfoSource (transactional data) | ![]() |
![]() |
![]() |
440 | ![]() |
RSSB_AUTHORITY_ADMWB_ISRCNEW REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization check new InfoSource | ![]() |
![]() |
![]() |
441 | ![]() |
RSSB_AUTHORITY_ADMWB_ISRC_MD REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization for InfoSource (master data) | ![]() |
![]() |
![]() |
442 | ![]() |
RSSB_AUTHORITY_ADMWB_MASTERDTA REFERENCE(I_ACTVT) TYPE AUTHB-ACTVT
|
Authorization Protection for Master Data Maintenance | ![]() |
![]() |
![]() |
443 | ![]() |
RSSB_AUTHORITY_ADMWB_MPRO REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection MultiProvider | ![]() |
![]() |
![]() |
444 | ![]() |
RSSB_AUTHORITY_ADMWB_OBJECT REFERENCE(I_ACTVT) LIKE TACT-ACTVT
|
Authorization Protection Admin WB Object | ![]() |
![]() |
![]() |
445 | ![]() |
RSSB_AUTHORITY_ADMWB_ODSOBJECT REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection ODS objects | ![]() |
![]() |
![]() |
446 | ![]() |
RSSB_AUTHORITY_ADMWB_ODSVIEW REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Protection Open ODS View | ![]() |
![]() |
![]() |
447 | ![]() |
RSSB_AUTHORITY_ADMWB_OHDEST REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Privilege protecting open hub destination | ![]() |
![]() |
![]() |
448 | ![]() |
RSSB_AUTHORITY_ADMWB_PC REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Privilege protection process chains | ![]() |
![]() |
![]() |
449 | ![]() |
RSSB_AUTHORITY_ADMWB_ROUTINE REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
450 | ![]() |
RSSB_AUTHORITY_ADMWB_TR REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
451 | ![]() |
RSSB_AUTHORITY_ADMWB_UOM REFERENCE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Protection InfoSet | ![]() |
![]() |
![]() |
452 | ![]() |
RSSB_AUTHORITY_CHARACTERISTIC REFERENCE(I_ACTIVITY) TYPE AUTHB-ACTVT
|
Authority Check for Characteristic Values | ![]() |
![]() |
![]() |
453 | ![]() |
RSSB_AUTHORITY_CHECK
|
General Authorization Check (Meta Objects) | ![]() |
![]() |
![]() |
454 | ![]() |
RSSB_AUTHORITY_CHECK_BEX
|
General Authorization Check (Meta Objects) | ![]() |
![]() |
![]() |
455 | ![]() |
RSSB_AUTHORITY_CHECK_WHM
|
General Authorization Check (Meta Objects) | ![]() |
![]() |
![]() |
456 | ![]() |
RSSB_AUTHORITY_COMP_CHECK VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Protection of Components in Business Explorer Query Editor | ![]() |
![]() |
![]() |
457 | ![]() |
RSSB_AUTHORITY_ICASS_CHECK VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Obsolete: Authorization Protection for InfoCatalog - User Assignment | ![]() |
![]() |
![]() |
458 | ![]() |
RSSB_AUTHORITY_INFOCAT_CHECK VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Obsolete: Privilege Protection Information Catalog | ![]() |
![]() |
![]() |
459 | ![]() |
RSSB_AUTH_ISOURCE_ODS VALUE(IACTVT) LIKE AUTHB-ACTVT
|
Authorithy-Check -master- and transaktiondata- ODS | ![]() |
![]() |
![]() |
460 | ![]() |
RSSEM_AUTHORITY_ADMWB_MD VALUE(I_ACTVT) TYPE AUTHB-ACTVT
|
RFC Case for RSSB_AUTHORITY_ADMWB_MASTERDTA | ![]() |
![]() |
![]() |
461 | ![]() |
RSSEM_AUTHORITY_CHARACTERISTIC VALUE(I_ACTIVITY) TYPE AUTHB-ACTVT
|
RFC hull for RSSB_AUTHORITY_CHARACTERISTIC | ![]() |
![]() |
![]() |
462 | ![]() |
RSSM_AUTHORITY_CHECK REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT OPTIONAL
|
Preprocessed FM for RSSM_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
463 | ![]() |
RSSM_PROCESS_AUTH_CHECK
|
Authorization Checks | ![]() |
![]() |
![]() |
464 | ![]() |
RSS_PROGCLASS_AUTHORITY_CHECK REFERENCE(I_ACTVT) TYPE ACTIV_AUTH DEFAULT '03'
|
RSS_PROGCLASS_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
465 | ![]() |
RSXMB_CHECK_PI_CLUSTER
|
Konsistenzprüfung für PI Clustertabellen | ![]() |
![]() |
![]() |
466 | ![]() |
RSZ_X_COMPONENT_AUTHTY_CHECK VALUE(I_ACTVT) TYPE ACTIV_AUTH
|
Authorization Check | ![]() |
![]() |
![]() |
467 | ![]() |
RSZ_X_VIEW_TREE_GET VALUE(I_AUTH_ACTVT) TYPE ACTIV_AUTH DEFAULT '03'
|
Returns Views of Queries as Tree | ![]() |
![]() |
![]() |
468 | ![]() |
RS_BCT_XA_AUTHORITY_CHECK REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH
|
Check Authority for upload | ![]() |
![]() |
![]() |
469 | ![]() |
RS_BCT_XA_X_OBJECT_DELETE
|
Delete xSA Object | ![]() |
![]() |
![]() |
470 | ![]() |
RS_BCT_XA_X_OBJECT_GETDETAIL
|
Get Object | ![]() |
![]() |
![]() |
471 | ![]() |
RS_COPR_AFTER_IMPORT
|
After Import Methode for Composite Providers | ![]() |
![]() |
![]() |
472 | ![]() |
RS_TABLE_LIST_CREATE
|
Generiert Anzeigereport für Tabellen | ![]() |
![]() |
![]() |
473 | ![]() |
RV_INVOICE_DOCUMENT_READ VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT ' '
|
Fakturabelege lesen | ![]() |
![]() |
![]() |
474 | ![]() |
RV_INVOICE_LIST_DOCUMENT_READ VALUE(ACTIVITY) LIKE TACT-ACTVT DEFAULT ' '
|
Rechnungsliste lesen | ![]() |
![]() |
![]() |
475 | ![]() |
RZW1_ROLEOBJ_AUTHORITY_CHECK REFERENCE(I_ACTIVITY) TYPE ACTIV_AUTH DEFAULT '23'
|
Authorization check for change / delete objects in rolls | ![]() |
![]() |
![]() |
476 | ![]() |
SAMPLE_INTERFACE_00010126 REFERENCE(I_ACTIVITY) TYPE TBKKI_02A-AKTYP
|
Process Item: Exclude Additional Function Codes | ![]() |
![]() |
![]() |
477 | ![]() |
SAMPLE_INTERFACE_00010210 VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Dialog Payment Item: Authorization Check | ![]() |
![]() |
![]() |
478 | ![]() |
SAMPLE_INTERFACE_00010410 VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Dialog Payment Order: Authorization Check | ![]() |
![]() |
![]() |
479 | ![]() |
SAMPLE_INTERFACE_00010411 VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Dialog Standing Order: Authorization Check | ![]() |
![]() |
![]() |
480 | ![]() |
SAMPLE_INTERFACE_00010950 VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Check Management: Authorization Check | ![]() |
![]() |
![]() |
481 | ![]() |
SAMPLE_INTERFACE_00011040 VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Account Master Data: Authorization Check | ![]() |
![]() |
![]() |
482 | ![]() |
SAMPLE_INTERFACE_UPS00020 REFERENCE(IM_ACTVTY) TYPE ACTIV_AUTH
|
BTE : Berechtigungsprüfung UPS | ![]() |
![]() |
![]() |
483 | ![]() |
SAMPLE_PROCESS_00010123 VALUE(I_XACTIVITY) TYPE TACT-ACTVT
|
PO: Determine Relevance Of Receiver Items Check | ![]() |
![]() |
![]() |
484 | ![]() |
SCMA_AUTHORITY_CHECK_SEQUENCE REFERENCE(ID_ACTIVITY) TYPE ACTIV_AUTH
|
SchedMan: Berechtigungsprüfung für Ablaufdefinition durchführen | ![]() |
![]() |
![]() |
485 | ![]() |
SCMA_AUTHORITY_CHECK_WORK_PLAN REFERENCE(ID_ACTIVITY) TYPE ACTIV_AUTH
|
SchedMan: Berechtigungsprüfung auf Ebene Arbeitsplan durchführen | ![]() |
![]() |
![]() |
486 | ![]() |
SDU_AUTH_CHECK VALUE(ACTION) LIKE AUTHB-ACTVT
|
UDM Data Modeler authorization check | ![]() |
![]() |
![]() |
487 | ![]() |
SD_CCARD_SALES_AUTHORITY_CHECK VALUE(I_ACTVT) LIKE TACT-ACTVT
|
Zahlungskarten: Berechtigungsprüfung für Verkaufsbelege | ![]() |
![]() |
![]() |
488 | ![]() |
SEC_ACCOUNT_AUTHORITY_CHECK REFERENCE(ACTVT) LIKE TACT-ACTVT
|
Prüfung der Berechtigung für Depot bzw. Depotbestand | ![]() |
![]() |
![]() |
489 | ![]() |
SEPAMANDAT_ALE_DATA_COLLECT REFERENCE(IV_ACTYPE) TYPE ACTIV_AUTH
|
Daten zum Verteilen zwischenspeichern | ![]() |
![]() |
![]() |
490 | ![]() |
SEPA_GET_APPLICATION VALUE(I_AKTYP) TYPE ACTIV_AUTH DEFAULT SPACE
|
SEPA: Anwendung setzen | ![]() |
![]() |
![]() |
491 | ![]() |
SEPA_MANDATE_DET_GET_PBO VALUE(E_AKTYP) TYPE ACTIV_AUTH
|
SEPA: Daten vom Detailbild lesen (PBO) | ![]() |
![]() |
![]() |
492 | ![]() |
SEPA_MANDATE_DIALOG VALUE(I_AKTYP) TYPE ACTIV_AUTH OPTIONAL
|
SEPA: Mandatsverwaltung (Transaktion) | ![]() |
![]() |
![]() |
493 | ![]() |
SEPA_MANDATE_GEN_F4 REFERENCE(I_AKTYP) TYPE ACTIV_AUTH OPTIONAL
|
SEPA: Generisches F4 | ![]() |
![]() |
![]() |
494 | ![]() |
SEPA_MANDATE_GEN_F4_1 REFERENCE(I_AKTYP) TYPE ACTIV_AUTH OPTIONAL
|
SEPA: Generisches F4 | ![]() |
![]() |
![]() |
495 | ![]() |
SEPA_MANDATE_GEN_F4_F REFERENCE(I_AKTYP) TYPE ACTIV_AUTH OPTIONAL
|
SEPA: Generisches F4 | ![]() |
![]() |
![]() |
496 | ![]() |
SEPA_MANDATE_STATUS_TR_CHECK REFERENCE(IV_ACTIVITY) TYPE ACTIV_AUTH
|
Check if the status change is allowed | ![]() |
![]() |
![]() |
497 | ![]() |
SEPA_MANDATE_UI_LIST_FULLSCR REFERENCE(IV_ACTYPE) TYPE ACTIV_AUTH DEFAULT '03'
|
SEPA: Auflisten von Mandaten in Fullscreen | ![]() |
![]() |
![]() |
498 | ![]() |
SEPA_MANDATE_UI_LIST_POPUP REFERENCE(IV_ACTYPE) TYPE ACTIV_AUTH DEFAULT '03'
|
SEPA: Auflisten von Mandaten in Pop-Up | ![]() |
![]() |
![]() |
499 | ![]() |
SEPA_MANDATE_UI_LOCK VALUE(I_AKTYP) TYPE ACTIV_AUTH DEFAULT '03'
|
SEPA-Mandat: Globale Sperren verwalten | ![]() |
![]() |
![]() |
500 | ![]() |
SIW_RFC_ACTIVATE_DDIC
|
Activates Data Dictionary Types | ![]() |
![]() |
![]() |