Where Used List (Function Module) for SAP ABAP Table AUTHB (SAP Basis Authorization Fields)
SAP ABAP Table
AUTHB (SAP Basis Authorization Fields) is used by
# | Object Type | Object Name | Object Description | Package | Structure Package | Software Component |
---|---|---|---|---|---|---|
![]() |
![]() |
![]() |
![]() |
![]() |
||
1 | ![]() |
/BDL/EXPORT_DOWNLOAD_TO_FILE6X
|
unicode version /BDL/_EXPORT_SESSDATA_TO_FILE | ![]() |
![]() |
![]() |
2 | ![]() |
/BDL/EXPORT_SESSDATA_TO_FILE6X
|
unicode version of /BDL_EXPORT_SESSDATA_TO_FILE | ![]() |
![]() |
![]() |
3 | ![]() |
/CUM/BAPI_CONMS_MAINTAIN
|
CU: BAPI construction measure maintain | ![]() |
![]() |
![]() |
4 | ![]() |
/SDF/CMO_GET_BUFFER_LIST
|
Read unimported transports from buffer | ![]() |
![]() |
![]() |
5 | ![]() |
/SDF/EWA_GET_PROCESSES
|
Get running processes on OS level | ![]() |
![]() |
![]() |
6 | ![]() |
/SDF/EWA_READ_FILE_INTO_TABLE
|
Reads a file in different ways | ![]() |
![]() |
![]() |
7 | ![]() |
/TDAG/CP_LB13_DIRECTORY_READ
|
/TDAG/CP_LB13_DIRECTORY_READ | ![]() |
![]() |
|
8 | ![]() |
/TDAG/CP_LB13_FILE_AUTH_CHECK
|
/TDAG/CP_LB13_FILE_AUTH_CHECK | ![]() |
![]() |
|
9 | ![]() |
/TDAG/CP_XX01_DOWNLOAD_ASCII
|
EHS: Download einer ASCII-Datei vom Applikationsserver auf den Front-End | ![]() |
![]() |
|
10 | ![]() |
ARCHIVFILE_CLIENT_TO_SERVER
|
Übertragen eines File vom Applikationsserver auf den Client | ![]() |
![]() |
![]() |
11 | ![]() |
ARCHIVFILE_SERVER_TO_CLIENT
|
Übertragen eines File vom Applikationsserver auf den Client | ![]() |
![]() |
![]() |
12 | ![]() |
ARCHIVFILE_SERVER_TO_TABLE
|
Kopieren Datei von Server auf Server | ![]() |
![]() |
![]() |
13 | ![]() |
ARCHIVOBJECT_CREATE_FILE
|
Datei ablegen über log. oder phys. Pfad vom Backend oder Frontend | ![]() |
![]() |
![]() |
14 | ![]() |
AS4_READ_INFOAPAR VALUE(AS4_FILENAME) TYPE AUTHB-FILENAME
|
iSeries: Read Information APAR | ![]() |
![]() |
![]() |
15 | ![]() |
AUTHORITY_CHECK_CPIC
|
Berechtigungsprüfung für CPIC-Zugriffe aus ABAP-Programmen | ![]() |
![]() |
![]() |
16 | ![]() |
AUTHORITY_CHECK_CPIC VALUE(DESTINATION) LIKE AUTHB-CPICDEST OPTIONAL
|
Berechtigungsprüfung für CPIC-Zugriffe aus ABAP-Programmen | ![]() |
![]() |
![]() |
17 | ![]() |
AUTHORITY_CHECK_CPIC VALUE(PROGRAM) LIKE AUTHB-PROGRAM OPTIONAL
|
Berechtigungsprüfung für CPIC-Zugriffe aus ABAP-Programmen | ![]() |
![]() |
![]() |
18 | ![]() |
AUTHORITY_CHECK_C_FUNCTION
|
Berechtigungsprüfung für C-Calls | ![]() |
![]() |
![]() |
19 | ![]() |
AUTHORITY_CHECK_C_FUNCTION VALUE(FUNCTION) LIKE AUTHB-CFUNCNAME
|
Berechtigungsprüfung für C-Calls | ![]() |
![]() |
![]() |
20 | ![]() |
AUTHORITY_CHECK_C_FUNCTION VALUE(PROGRAM) LIKE AUTHB-PROGRAM OPTIONAL
|
Berechtigungsprüfung für C-Calls | ![]() |
![]() |
![]() |
21 | ![]() |
AUTHORITY_CHECK_DATASET VALUE(FILENAME) LIKE AUTHB-FILENAME
|
Check Authorization for File Access | ![]() |
![]() |
![]() |
22 | ![]() |
AUTHORITY_CHECK_DATASET VALUE(PROGRAM) LIKE AUTHB-PROGRAM OPTIONAL
|
Check Authorization for File Access | ![]() |
![]() |
![]() |
23 | ![]() |
AUTHORITY_CHECK_DATASET
|
Check Authorization for File Access | ![]() |
![]() |
![]() |
24 | ![]() |
AUTHORITY_CHECK_OLE VALUE(APPLICATION) LIKE AUTHB-OLE_APPL
|
Berechtigungsprüfung für OLE-Aufrufe | ![]() |
![]() |
![]() |
25 | ![]() |
AUTHORITY_CHECK_OLE VALUE(PROGRAM) LIKE AUTHB-PROGRAM OPTIONAL
|
Berechtigungsprüfung für OLE-Aufrufe | ![]() |
![]() |
![]() |
26 | ![]() |
AUTHORITY_CHECK_OLE
|
Berechtigungsprüfung für OLE-Aufrufe | ![]() |
![]() |
![]() |
27 | ![]() |
AUTHORITY_CHECK_RFC VALUE(FUNCTIONGROUP) LIKE AUTHB-RFC_NAME DEFAULT '*'
|
Nachbildung der Kernel-Berechtigungsprüfung S_RFC zur RFC-Ausführung | ![]() |
![]() |
![]() |
28 | ![]() |
BEGRP_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Instandhaltung: Berechtigungsgruppe (I_BEGRP) | ![]() |
![]() |
![]() |
29 | ![]() |
BM_OBJECT_AUTHORITY_CHECK
|
Berechtigungsprüfung für Prozeßmodellelemente | ![]() |
![]() |
![]() |
30 | ![]() |
C13IF_EXPORT_EXECUTE
|
EHS: EC IUCLID 5 Interface: Lese Daten | ![]() |
![]() |
![]() |
31 | ![]() |
C13Q_EXPORT_DATA_INIT
|
EHS: Export-Daten initialisieren | ![]() |
![]() |
![]() |
32 | ![]() |
C13Q_IMPORT_DATA_INIT
|
EHS: Import-Daten initialisieren | ![]() |
![]() |
![]() |
33 | ![]() |
C13Z_FILE_DOWNLOAD_ASCII
|
EHS: Download einer ASCII-Datei vom Applikationsserver auf den Front-End | ![]() |
![]() |
![]() |
34 | ![]() |
C13Z_FILE_DOWNLOAD_BINARY
|
EHS: Download einer Binär-Datei vom Applikationsserver auf den Front-End | ![]() |
![]() |
![]() |
35 | ![]() |
C13Z_FILE_UPLOAD_ASCII
|
EHS: Upload einer ASCII-Datei vom PC zum Applikationsserver | ![]() |
![]() |
![]() |
36 | ![]() |
C13Z_FILE_UPLOAD_BINARY
|
EHS: Upload einer Binär-Datei vom PC zum Applikationsserver | ![]() |
![]() |
![]() |
37 | ![]() |
C13Z_RAWDATA_READ
|
EHS: Lesen von Rohdaten aus einem Appl.-Server File | ![]() |
![]() |
![]() |
38 | ![]() |
C13Z_RAWDATA_WRITE
|
EHS: Schreiben von Rohdaten in ein Appl.-Server File | ![]() |
![]() |
![]() |
39 | ![]() |
C13Z_TEXT_WRITE
|
EHS: Anlegen/Überschreiben einer Datei auf dem Applikationsserver | ![]() |
![]() |
![]() |
40 | ![]() |
C14H_REPIMPORT_KEYFILE_READ
|
EHS: Lesen eines Key-Files in einem Appl.Server-Verzeichnis | ![]() |
![]() |
![]() |
41 | ![]() |
CBDU_DL00_AUTHORITY_CHECK
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm | ![]() |
![]() |
![]() |
42 | ![]() |
CHECK_DIVERSE_AUTHORITIES VALUE(OBJECTTYPE) LIKE AUTHB-OBJECTTYPE
|
SAPscript: Prüfen Berechtigung für diverse SAPscript-Steuerungen | ![]() |
![]() |
![]() |
43 | ![]() |
CLIENTCOPY_NEXT_PROTNUMBER
|
CLIENTCOPY_NEXT_PROTNUMBER | ![]() |
![]() |
![]() |
44 | ![]() |
CNV_TDMS_16_AUTHORITY_CHECK
|
FM to check authorization to call kernel C functions | ![]() |
![]() |
![]() |
45 | ![]() |
CSM_SHOW_FILE
|
CSM_SHOW_FILE | ![]() |
![]() |
![]() |
46 | ![]() |
DOWNLOAD_TO_APPSERVER
|
Download to application server | ![]() |
![]() |
![]() |
47 | ![]() |
DX_FILE_COPY
|
DX_FILE_COPY | ![]() |
![]() |
![]() |
48 | ![]() |
DX_FILE_CREATE_INITIAL
|
Erstellen einer initialen Datei (IDoc, Batch Input, Direct Input) | ![]() |
![]() |
![]() |
49 | ![]() |
DX_FILE_DELETE
|
Delete File | ![]() |
![]() |
![]() |
50 | ![]() |
DX_FILE_EDIT
|
DX_FILE_EDIT | ![]() |
![]() |
![]() |
51 | ![]() |
DX_IDOC_SYNTAX_CHECK
|
DX_IDOC_SYNTAX_CHECK | ![]() |
![]() |
![]() |
52 | ![]() |
DX_MAP_CREATE_TEST_DATA
|
DX_MAP_CREATE_TEST_DATA | ![]() |
![]() |
![]() |
53 | ![]() |
DX_MERGE_FILES
|
Merge Files | ![]() |
![]() |
![]() |
54 | ![]() |
DX_MERGE_FILE_CHECKS
|
DX_MERGE_FILE_CHECKS | ![]() |
![]() |
![]() |
55 | ![]() |
DX_OUT_2_IN_IDOCFILE
|
DX_OUT_2_IN_IDOCFILE | ![]() |
![]() |
![]() |
56 | ![]() |
DX_SPLIT_FILE_CHECKS
|
DX_SPLIT_FILE_CHECKS | ![]() |
![]() |
![]() |
57 | ![]() |
DX_SYNTAX_CHECK_SXDA
|
DX_SYNTAX_CHECK_SXDA | ![]() |
![]() |
![]() |
58 | ![]() |
E2E_TESTING_AGENT_READ_ATRA
|
Read ATRA files DATA and map it to TBOM format | ![]() |
![]() |
![]() |
59 | ![]() |
EHS_VIEW_MAINTENANCE_CALL
|
Aufruf der erweiterten Tabellenpflege (Viewpflege) oberste Einstiegsebene | ![]() |
![]() |
![]() |
60 | ![]() |
EXIT_SAPLSPOR_001 VALUE(ACCESS) LIKE AUTHB-SPOACTION
|
Customer-Specific Spool Authorization Check | ![]() |
![]() |
![]() |
61 | ![]() |
FI_PSO_AVVISO_FILE_WRITE
|
Funktion zum Schreiben der Schnittstellendatei fuer AVVISO | ![]() |
![]() |
![]() |
62 | ![]() |
FKJO_JC_EXPORT_LIST VALUE(FILE_NAME) LIKE AUTHB-FILENAME OPTIONAL
|
OBSOLET: Exportiert eine JobInfo-Tabelle in eine Datei auf dem App-Server | ![]() |
![]() |
![]() |
63 | ![]() |
FKJO_JC_GETJOBLIST_RFC VALUE(FILE_NAME) LIKE AUTHB-FILENAME
|
OBSOLET: Liefert eine Übersichtsliste von Jobs | ![]() |
![]() |
![]() |
64 | ![]() |
FKJO_JC_GETJOBPROTOKOLL_RFC VALUE(FILE_NAME) LIKE AUTHB-FILENAME
|
OBSOLET: RFC-FB zum Lesen eines Job-Protokolls | ![]() |
![]() |
![]() |
65 | ![]() |
FKK_AR_PROGRAM_OPEN VALUE(I_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Generic controls for Argentina Legal Reports | ![]() |
![]() |
![]() |
66 | ![]() |
FKK_AR_REV_PROGRAM_OPEN VALUE(I_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Generic controls for Argentina Legal Reports | ![]() |
![]() |
![]() |
67 | ![]() |
FKK_CHECKM_AUTHORITY_CHECK
|
Stapel man. Ausgangsschecks: Berechtigungsprüfung | ![]() |
![]() |
![]() |
68 | ![]() |
FKK_COLLECTION_FILE VALUE(I_FILE_NAME) LIKE AUTHB-FILENAME
|
FI-CA: Erzeugen eines Abgabefiles für das Inkassobüro | ![]() |
![]() |
![]() |
69 | ![]() |
FKK_COLLECTION_FILE_BODY
|
FI-CA: Erzeugen eines Abgabefiles für das Inkassobüro | ![]() |
![]() |
![]() |
70 | ![]() |
FKK_COLLECTION_FILE_HEADER
|
FI-CA: Erzeugen eines Abgabefiles für das Inkassobüro --- Kopfdaten | ![]() |
![]() |
![]() |
71 | ![]() |
FKK_COLLECTION_FILE_TRAILER
|
FI-CA: Erzeugen eines Abgabefiles für das Inkassobüro --- Fuß | ![]() |
![]() |
![]() |
72 | ![]() |
FKK_DISPLAY_COLL_FILE_CONTENTS
|
Inhalt einer Inkassobüro Datei anzeigen | ![]() |
![]() |
![]() |
73 | ![]() |
FKK_REFUSAL_AUTHORITY
|
VKK Rückläufer - Geschäftspartner für Gebührenbuchung feststellen | ![]() |
![]() |
![]() |
74 | ![]() |
FMCT_COPY_PCFILE_FROM_UNIXFILE VALUE(UX_FILE) LIKE AUTHB-FILENAME
|
Auslesen UNIX-File und Ausgabe als PC-File (ASCI) | ![]() |
![]() |
![]() |
75 | ![]() |
FMCT_COPY_UNIXFILE_FROM_PCFILE VALUE(UX_FILE) LIKE AUTHB-FILENAME
|
Auslesen PC-File und Ausgabe als UNIX-File (ASCI) | ![]() |
![]() |
![]() |
76 | ![]() |
FMCT_DELETE_UNIXFILE VALUE(UX_FILE) LIKE AUTHB-FILENAME DEFAULT '1'
|
Auslesen UNIX-File (Zur Kontrolle von Batchinput-Daten) | ![]() |
![]() |
![]() |
77 | ![]() |
FMCT_READ_UNIXFILE VALUE(UX_FILE) LIKE AUTHB-FILENAME DEFAULT '1'
|
Auslesen UNIX-File (Zur Kontrolle von Batchinput-Daten) | ![]() |
![]() |
![]() |
78 | ![]() |
FMCT_WRITE_UNIXFILE_FMBPH VALUE(UX_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Erstellen Testdaten für Batchinput Rechnungserg. auf Unix-File (Kommunen) | ![]() |
![]() |
![]() |
79 | ![]() |
FMCT_WRITE_UNIXFILE_FMBPX VALUE(UX_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Erstellen Testdaten für Batchinput HH-Plandaten auf Unix-File (Kommunen) | ![]() |
![]() |
![]() |
80 | ![]() |
FMCT_WRITE_UNIXFILE_FMBRX VALUE(UX_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Erstellen Testdaten für BI Budgetreste GJW auf Unix-File (Kommunen) | ![]() |
![]() |
![]() |
81 | ![]() |
FMCT_WRITE_UNIXFILE_FMPPX VALUE(UX_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Erstellen Testdaten für Batchinput FM-Stammdaten (Finzpos. im Plan/FIKRS) | ![]() |
![]() |
![]() |
82 | ![]() |
G_DATABASE_AUTHORITY_CHECK VALUE(ACTVT) LIKE AUTHB-ACTVT
|
G_DATABASE_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
83 | ![]() |
HAZMAT_AUTH_DGEXCEPT_CHECK REFERENCE(E_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm (GG-Ausnahmen) | ![]() |
![]() |
![]() |
84 | ![]() |
HAZMAT_AUTH_DGTMD_CHECK REFERENCE(E_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm | ![]() |
![]() |
![]() |
85 | ![]() |
HAZMAT_AUTH_DGTMD_CHECK
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm | ![]() |
![]() |
![]() |
86 | ![]() |
HAZMAT_AUTH_DGTMD_CHECK_M
|
GG: Prüfung auf Berechtigung für den Gefahrgutmaterialstamm mit Nachricht | ![]() |
![]() |
![]() |
87 | ![]() |
HAZMAT_AUTH_MESSAGE_HANDLING VALUE(I_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Ausgabe der Meldungen bei nicht vorhandener Berechtigung | ![]() |
![]() |
![]() |
88 | ![]() |
HAZMAT_AUTH_TEXT_CHECK
|
GG: Prüfung auf Berechtigung für Gefahrguttexte | ![]() |
![]() |
![]() |
89 | ![]() |
HAZMAT_AUTH_TEXT_CHECK VALUE(E_AUTH_NOT_EXIST_FOR) LIKE AUTHB-ACTVT
|
GG: Prüfung auf Berechtigung für Gefahrguttexte | ![]() |
![]() |
![]() |
90 | ![]() |
HAZMAT_AUTH_TEXT_CHECK_M
|
GG: Prüfung auf Berechtigung für Gefahrguttexte mit Nachricht | ![]() |
![]() |
![]() |
91 | ![]() |
HAZMAT_RESULT_LIST_CALL
|
GG: Vorbereitung und Einstieg in Trefferliste | ![]() |
![]() |
![]() |
92 | ![]() |
HR_CA_DOWNLOAD_TO_APPSERVER
|
Download to application server | ![]() |
![]() |
![]() |
93 | ![]() |
IDCN_GAIS_CREATE_FILE
|
Download internal table to app server or front end | ![]() |
![]() |
![]() |
94 | ![]() |
INGRP_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Instandhaltung: Instandhaltungsplanergruppe (I_INGRP) | ![]() |
![]() |
![]() |
95 | ![]() |
INST_AUTHORITY_CHECK_ALL VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Inst: IH-Werk, S-Werk, BerechtGrp | ![]() |
![]() |
![]() |
96 | ![]() |
ISH_CHECK_FILENAME
|
Is-H: Überprüft, ob ein seq. File vorhanden und fragt nach Überschreiben | ![]() |
![]() |
![]() |
97 | ![]() |
ISH_DRGCDF_FILE_DELETE
|
IS-H: DRG Datei kopieren (copy or move) | ![]() |
![]() |
![]() |
98 | ![]() |
ISH_N2_PCDOC_ARCHIV
|
IS-H*MED: Eintrag aus Tabelle N2PCDOC zum Archivieren übertragen | ![]() |
![]() |
![]() |
99 | ![]() |
ISH_N2_RAD_MSI_WRITE_FILE
|
IS-H*MED RAD: write MSI File | ![]() |
![]() |
![]() |
100 | ![]() |
ISH_RFC_AUTHORITY_CHECK_API1
|
IS-H: Check authorization for FM call by RFC | ![]() |
![]() |
![]() |
101 | ![]() |
ISP_PAYROLL_ACCOUNTING_FILE
|
IS-PSD: Überleitung von Abrechnungen ans HR, File-Erstellung | ![]() |
![]() |
![]() |
102 | ![]() |
ISU_AR_PROGRAM_OPEN VALUE(I_FILE) LIKE AUTHB-FILENAME OPTIONAL
|
Generic controls for Argentina Legal Reports | ![]() |
![]() |
![]() |
103 | ![]() |
IWERK_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Inst: Instandhaltungsplanungswerk ( I_IWERK ) | ![]() |
![]() |
![]() |
104 | ![]() |
KOSTL_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Instandhaltung: Kostenstelle (I_KOSTL) | ![]() |
![]() |
![]() |
105 | ![]() |
LOAD_TEMP_STORAGE
|
Load temporary storage with dialog | ![]() |
![]() |
![]() |
106 | ![]() |
MSAM10_CLASSI_GETLIST
|
PM/CS: Get the list of classifications | ![]() |
![]() |
![]() |
107 | ![]() |
MY_VALUATION_AREAS_GET VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Ermitteln der LIFO- und FIFO-Ebenen aus Buchungskreis und Bewertungskreis | ![]() |
![]() |
![]() |
108 | ![]() |
OCS_GET_EXPORT_LANGUAGE
|
Get Export Language | ![]() |
![]() |
![]() |
109 | ![]() |
OCS_GET_TRANSPORT_FILES
|
Copies transport files from remote system | ![]() |
![]() |
![]() |
110 | ![]() |
OCS_OVERSHOOTERS
|
Collect patch overshooters during Add-On upgrade/installation (>=4.6) | ![]() |
![]() |
![]() |
111 | ![]() |
QMEL_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Instandhaltung: Meldungsart (I_QMEL) | ![]() |
![]() |
![]() |
112 | ![]() |
RFC_TRACE_DELETE
|
Löschen der RFC-Traces (dev_rfc-Dateien) | ![]() |
![]() |
![]() |
113 | ![]() |
RKD_AUTHORITY_FUNCTION_CHECK
|
RKD: validation of authorization for individual functions in reporting | ![]() |
![]() |
![]() |
114 | ![]() |
RKD_AUTHORITY_REPID_EXEC_CHECK
|
Check authorization to execute drill-down report | ![]() |
![]() |
![]() |
115 | ![]() |
ROUT1_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Inst: Arbeitsplaner, Arbeitsplanstatus (I_ROUT1) | ![]() |
![]() |
![]() |
116 | ![]() |
RRMX_WORKBOOK_QUERIES_GET VALUE(I_ACTVT) LIKE AUTHB-ACTVT OPTIONAL
|
Get all the queries that appear in a Workbook | ![]() |
![]() |
![]() |
117 | ![]() |
RSAU_UPDR_AWBN_CALL
|
Calling the update rules from AWBN | ![]() |
![]() |
![]() |
118 | ![]() |
RSAU_UPDR_CALL_TRANSACTION
|
Calling the update rules from the AWB | ![]() |
![]() |
![]() |
119 | ![]() |
RSDDG_AUTHY_CHECK REFERENCE(I_ACTVT) TYPE AUTHB-ACTVT
|
Authorization Check | ![]() |
![]() |
![]() |
120 | ![]() |
RSDG_CUBE_SAVE_DATASTATE
|
Sets the flags to the data state of an InfoCube | ![]() |
![]() |
![]() |
121 | ![]() |
RSPO_CHECK_JOB_ID_PERMISSION VALUE(ACCESS) LIKE AUTHB-SPOACTION
|
Check authorizations to access spool job | ![]() |
![]() |
![]() |
122 | ![]() |
RSPO_CHECK_JOB_PERMISSION VALUE(ACCESS) LIKE AUTHB-SPOACTION
|
Check Authorizations to Access Spool Request | ![]() |
![]() |
![]() |
123 | ![]() |
RSPO_CHECK_JOB_PERMISSION_EXIT VALUE(ACCESS) LIKE AUTHB-SPOACTION
|
RSPO_CHECK_JOB_PERMISSION_EXIT | ![]() |
![]() |
![]() |
124 | ![]() |
RSPO_CHECK_OUTRQ_PERMISSION VALUE(ACCESS) LIKE AUTHB-SPOACTION
|
Check job permission | ![]() |
![]() |
![]() |
125 | ![]() |
RSPO_ISELECT_SPOOLREQS VALUE(ACCESS) LIKE AUTHB-SPOACTION DEFAULT ' '
|
RSPO_ISELECT_SPOOLREQS | ![]() |
![]() |
![]() |
126 | ![]() |
RSPO_L_RSELECT_SPOOLREQS VALUE(ACCESS) LIKE AUTHB-SPOACTION DEFAULT ' '
|
Selektiert die Spoolaufträge gemäß übergebener Select-Options | ![]() |
![]() |
![]() |
127 | ![]() |
RSPO_R_CHECK_OUTRQ_PERMISSION VALUE(ACCESS) LIKE AUTHB-SPOACTION
|
Remote RSPO_CHECK_DEVICE_PERMISSION | ![]() |
![]() |
![]() |
128 | ![]() |
RSPO_R_RSELECT_SPOOLREQS VALUE(ACCESS) LIKE AUTHB-SPOACTION DEFAULT ' '
|
Selektiert die Spoolaufträge gemäß übergebener Select-Options | ![]() |
![]() |
![]() |
129 | ![]() |
RSPO_R_RSTART_JOB
|
Remote RSPOAEPJ | ![]() |
![]() |
![]() |
130 | ![]() |
RSPO_TEST_UPDATE_TASK VALUE(SPOAUTH) LIKE AUTHB-SPOAUTH DEFAULT ' '
|
RSPO_TEST_UPDATE_TASK | ![]() |
![]() |
![]() |
131 | ![]() |
RSPO_TEST_UPDATE_TASK VALUE(SPOACTION) LIKE AUTHB-SPOACTION DEFAULT ' '
|
RSPO_TEST_UPDATE_TASK | ![]() |
![]() |
![]() |
132 | ![]() |
RSSB_AUTHORITY_ADMWB_DS REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
133 | ![]() |
RSSB_AUTHORITY_ADMWB_DTA REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization data targets: InfoCubes and ODS Objects | ![]() |
![]() |
![]() |
134 | ![]() |
RSSB_AUTHORITY_ADMWB_DTP REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
135 | ![]() |
RSSB_AUTHORITY_ADMWB_HIERARCHY REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Protection Hierarchy | ![]() |
![]() |
![]() |
136 | ![]() |
RSSB_AUTHORITY_ADMWB_INFOCUBE REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection InfoCube | ![]() |
![]() |
![]() |
137 | ![]() |
RSSB_AUTHORITY_ADMWB_IOBC REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection InfoObjectCatalog | ![]() |
![]() |
![]() |
138 | ![]() |
RSSB_AUTHORITY_ADMWB_IOBJ REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Protection InfoObject | ![]() |
![]() |
![]() |
139 | ![]() |
RSSB_AUTHORITY_ADMWB_ISOURCE REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization for InfoSource (transactional data) | ![]() |
![]() |
![]() |
140 | ![]() |
RSSB_AUTHORITY_ADMWB_ISRCNEW REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization check new InfoSource | ![]() |
![]() |
![]() |
141 | ![]() |
RSSB_AUTHORITY_ADMWB_ISRC_MD REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization for InfoSource (master data) | ![]() |
![]() |
![]() |
142 | ![]() |
RSSB_AUTHORITY_ADMWB_MASTERDTA REFERENCE(I_ACTVT) TYPE AUTHB-ACTVT
|
Authorization Protection for Master Data Maintenance | ![]() |
![]() |
![]() |
143 | ![]() |
RSSB_AUTHORITY_ADMWB_MPRO REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection MultiProvider | ![]() |
![]() |
![]() |
144 | ![]() |
RSSB_AUTHORITY_ADMWB_ODSOBJECT REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization protection ODS objects | ![]() |
![]() |
![]() |
145 | ![]() |
RSSB_AUTHORITY_ADMWB_OHDEST REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Privilege protecting open hub destination | ![]() |
![]() |
![]() |
146 | ![]() |
RSSB_AUTHORITY_ADMWB_PC REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Privilege protection process chains | ![]() |
![]() |
![]() |
147 | ![]() |
RSSB_AUTHORITY_ADMWB_ROUTINE REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
148 | ![]() |
RSSB_AUTHORITY_ADMWB_TR REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Check for New DataSource | ![]() |
![]() |
![]() |
149 | ![]() |
RSSB_AUTHORITY_CHARACTERISTIC REFERENCE(I_ACTIVITY) TYPE AUTHB-ACTVT
|
Authority Check for Characteristic Values | ![]() |
![]() |
![]() |
150 | ![]() |
RSSB_AUTHORITY_COMP_CHECK VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Authorization Protection of Components in Business Explorer Query Editor | ![]() |
![]() |
![]() |
151 | ![]() |
RSSB_AUTHORITY_ICASS_CHECK VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Obsolete: Authorization Protection for InfoCatalog - User Assignment | ![]() |
![]() |
![]() |
152 | ![]() |
RSSB_AUTHORITY_INFOCAT_CHECK VALUE(I_ACTVT) LIKE AUTHB-ACTVT
|
Obsolete: Privilege Protection Information Catalog | ![]() |
![]() |
![]() |
153 | ![]() |
RSSB_AUTH_ISOURCE_ODS
|
Authorithy-Check -master- and transaktiondata- ODS | ![]() |
![]() |
![]() |
154 | ![]() |
RSSB_AUTH_ISOURCE_ODS VALUE(IACTVT) LIKE AUTHB-ACTVT
|
Authorithy-Check -master- and transaktiondata- ODS | ![]() |
![]() |
![]() |
155 | ![]() |
RSSEM_AUTHORITY_ADMWB_MD VALUE(I_ACTVT) TYPE AUTHB-ACTVT
|
RFC Case for RSSB_AUTHORITY_ADMWB_MASTERDTA | ![]() |
![]() |
![]() |
156 | ![]() |
RSSEM_AUTHORITY_CHARACTERISTIC VALUE(I_ACTIVITY) TYPE AUTHB-ACTVT
|
RFC hull for RSSB_AUTHORITY_CHARACTERISTIC | ![]() |
![]() |
![]() |
157 | ![]() |
RSSM_AUTHORITY_CHECK REFERENCE(I_ACTVT) LIKE AUTHB-ACTVT OPTIONAL
|
Preprocessed FM for RSSM_AUTHORITY_CHECK | ![]() |
![]() |
![]() |
158 | ![]() |
RSZ_X_COMPONENT_LIST_GET
|
Returns Components by InfoArea and InfoCube (Incl. Texts) | ![]() |
![]() |
![]() |
159 | ![]() |
SCC1_LOG_MSG_CLIENT_CP_MEM
|
SCC1_LOG_MSG_CLIENT_CP_MEM | ![]() |
![]() |
![]() |
160 | ![]() |
SCC1_LOG_MSG_EXT_CLIENT_CP
|
SCC1_LOG_MSG_EXT_CLIENT_CP | ![]() |
![]() |
![]() |
161 | ![]() |
SCMS_CERT_PSE_DELETE
|
Zertifikat aus PSE löschen | ![]() |
![]() |
![]() |
162 | ![]() |
SCMS_CERT_PSE_PUT
|
SCMS_CERT_PSE_PUT | ![]() |
![]() |
![]() |
163 | ![]() |
SCMS_CLIENT_TO_R3
|
SCMS_CLIENT_TO_R3 | ![]() |
![]() |
![]() |
164 | ![]() |
SCMS_FILE_CHECK_EXISTENCE
|
CMS: Existenz einer Datei prüfen | ![]() |
![]() |
![]() |
165 | ![]() |
SCMS_FILE_DELETE
|
CMS: Datei löschen | ![]() |
![]() |
![]() |
166 | ![]() |
SCMS_R3_TO_CLIENT
|
SCMS_R3_TO_CLIENT | ![]() |
![]() |
![]() |
167 | ![]() |
SCSM_CSMCONF_CREATE
|
CSMCONF Datei anlegen und speichern | ![]() |
![]() |
![]() |
168 | ![]() |
SDU_AUTH_CHECK VALUE(ACTION) LIKE AUTHB-ACTVT
|
UDM Data Modeler authorization check | ![]() |
![]() |
![]() |
169 | ![]() |
SDU_AUTH_CHECK VALUE(OBJECT_NAME) LIKE AUTHB-OBJNAME DEFAULT ' '
|
UDM Data Modeler authorization check | ![]() |
![]() |
![]() |
170 | ![]() |
SDU_AUTH_CHECK
|
UDM Data Modeler authorization check | ![]() |
![]() |
![]() |
171 | ![]() |
SDU_AUTH_CHECK VALUE(OBJECT_TYPE) LIKE AUTHB-OBJTYPE DEFAULT ' '
|
UDM Data Modeler authorization check | ![]() |
![]() |
![]() |
172 | ![]() |
SDU_AUTH_CHECK VALUE(DEVELOPMENT_CLASS) LIKE AUTHB-DEVCLASS DEFAULT ' '
|
UDM Data Modeler authorization check | ![]() |
![]() |
![]() |
173 | ![]() |
SDU_SWITCH_READ_ONLY
|
UDM Umschalten Anzeige-/Pflegemodus | ![]() |
![]() |
![]() |
174 | ![]() |
SLRF_INSERT_NEW_PROTOCOL
|
Protokoll-initialisierer | ![]() |
![]() |
![]() |
175 | ![]() |
SSFPSE_DOWNLOAD
|
SSFPSE_DOWNLOAD | ![]() |
![]() |
![]() |
176 | ![]() |
SSFPSE_UPLOAD
|
SSFPSE_UPLOAD | ![]() |
![]() |
![]() |
177 | ![]() |
SSFR_PUT_CERTIFICATE_FILE
|
Zertifikatsliste einer PSE erweitern | ![]() |
![]() |
![]() |
178 | ![]() |
STRF_LOCK_COFI
|
Sperre Cofile-Datei des Change and Transport System | ![]() |
![]() |
![]() |
179 | ![]() |
STRF_LOCK_SAPNAMES
|
Sperre Sapnames-Datei des Change and Transport System | ![]() |
![]() |
![]() |
180 | ![]() |
STRF_LOG_MOD_SAPNAMES
|
Logik-Modul zur Statusbestimmung des Sapnamesfile | ![]() |
![]() |
![]() |
181 | ![]() |
SUSR_RFC_USER_INTERFACE VALUE(ACTIVITY) LIKE AUTHB-ACTVT DEFAULT '03'
|
SUSR_RFC_USER_INTERFACE | ![]() |
![]() |
![]() |
182 | ![]() |
SUSR_RFC_USER_INTERFACE_40 VALUE(ACTIVITY) LIKE AUTHB-ACTVT DEFAULT '03'
|
SUSR_RFC_USER_INTERFACE_40 | ![]() |
![]() |
![]() |
183 | ![]() |
SWERK_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Instandhaltung: Standortwerk (I_SWERK) | ![]() |
![]() |
![]() |
184 | ![]() |
SWO_OBJTYPE_AUTHORITY_CHECK
|
Berechtigungsprüfung für Objekttypen | ![]() |
![]() |
![]() |
185 | ![]() |
SYSTEM_HOOK_OPEN_DATASET
|
Hook for OPEN DATASET | ![]() |
![]() |
![]() |
186 | ![]() |
TB_LIMIT_TRANSACTION_POPUP
|
Output of a Check Result of a Single Transaction | ![]() |
![]() |
![]() |
187 | ![]() |
TCODE_INST_AUTHORITY_CHECK VALUE(TCODE) LIKE AUTHB-TCD DEFAULT SY-TCODE
|
Berechtigungsprüfung Instandhaltung: Transaktionscode | ![]() |
![]() |
![]() |
188 | ![]() |
TMS_CFG_CREATE_USER_TMSADM
|
TMS Cfg: Benutzer TMSADM anlegen | ![]() |
![]() |
![]() |
189 | ![]() |
TMS_CFG_GET_LOCAL_SYSTEM_INFO
|
TMS Cfg: Information zu lokalem System lesem | ![]() |
![]() |
![]() |
190 | ![]() |
TMS_CFG_WRITE_DOMAIN_CFG_FILE
|
TMS Cfg: Konfiguration in Datei DOMAIN.CFG schreiben | ![]() |
![]() |
![]() |
191 | ![]() |
TMS_TP_CHECK_TRANS_DIR
|
Transportverzeichnis prüfen | ![]() |
![]() |
![]() |
192 | ![]() |
TMS_TP_ENQUEUE_BUFFER
|
Sperre für Buffertransfer anlegen/löschen | ![]() |
![]() |
![]() |
193 | ![]() |
TRINT_DISPLAY_FILE_CONTENTS
|
Inhalt einer Datei anzeigen | ![]() |
![]() |
![]() |
194 | ![]() |
TRINT_PP_READ_TPPARAM_FILE
|
intern: TPPARAM Datei lesen | ![]() |
![]() |
![]() |
195 | ![]() |
TRINT_PP_WRITE_TPPARAM_FILE
|
intern: TPPARAM Datei schreiben | ![]() |
![]() |
![]() |
196 | ![]() |
TR_DELETE_LOG
|
Delete log | ![]() |
![]() |
![]() |
197 | ![]() |
TXW_FILE_OPEN_FOR_READ
|
Open file on application server for reading | ![]() |
![]() |
![]() |
198 | ![]() |
TXW_FILE_OPEN_FOR_WRITE
|
Open file on application server for writing | ![]() |
![]() |
![]() |
199 | ![]() |
TXX_FILE_OPEN_FOR_READ
|
Datei zum lesen oeffnen | ![]() |
![]() |
![]() |
200 | ![]() |
TXX_FILE_OPEN_FOR_WRITE
|
Oeffnen Datei zum Schreiben | ![]() |
![]() |
![]() |
201 | ![]() |
UPLOAD_INFOAPAR_FOR_PTF_CHECK VALUE(AS4_FILENAME) LIKE AUTHB-FILENAME
|
AS/400: Upload Infoapar from local harddisk | ![]() |
![]() |
![]() |
202 | ![]() |
USS_STAKEHOLDER_AUTHORITYCHECK VALUE(I_AKTTYPE) LIKE AUTHB-ACTVT
|
Berechtigungsprüfung für Stakeholder | ![]() |
![]() |
![]() |
203 | ![]() |
VIEW_MAINTENANCE_CALL
|
Call Extended Table Maintenance (View Maint) Highest Level | ![]() |
![]() |
![]() |
204 | ![]() |
VIEW_MAINTENANCE_GIVEN_DATA
|
erweiterte Tabellenpflege für bereits eingelesene Daten | ![]() |
![]() |
![]() |
205 | ![]() |
VIEW_MAINTENANCE_SINGLE_ENTRY
|
Extended Table Maintenance: Maintain an Individual Entry | ![]() |
![]() |
![]() |