cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Authorization Objects

ruchirsaxena
Participant
0 Likes
733

Can anyone please explain the logical flow of custom authorization objects?

I know how to create them. But I am confused how does the mapping with their respective DDIC objects work.

I am using Steampunk (ABAP Cloud).

Thanks in Advance.

Accepted Solutions (0)

Answers (2)

Answers (2)

FrankJentsch
Product and Topic Expert
Product and Topic Expert

... and the respective documentation of the IAM concepts

ruchirsaxena
Participant
0 Likes

Thank you for this link. It explains quite well the correlations.

Andre_Fischer
Product and Topic Expert
Product and Topic Expert
ruchirsaxena
Participant
0 Likes

Thank you for the answer. I have seen Authorization Objects being using in Communication Scenario objects, and I am a bit curious in how many ways can these auth objects be used, and how should the auth fields then be defined. But going through both the links, I definitely have better insight now.