cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Authorization Objects

ruchirsaxena
Participant
0 Likes
735

Can anyone please explain the logical flow of custom authorization objects?

I know how to create them. But I am confused how does the mapping with their respective DDIC objects work.

I am using Steampunk (ABAP Cloud).

Thanks in Advance.

View Entire Topic
Andre_Fischer
Product and Topic Expert
Product and Topic Expert
ruchirsaxena
Participant
0 Likes

Thank you for the answer. I have seen Authorization Objects being using in Communication Scenario objects, and I am a bit curious in how many ways can these auth objects be used, and how should the auth fields then be defined. But going through both the links, I definitely have better insight now.