on ‎2023 May 03 3:10 PM
Can anyone please explain the logical flow of custom authorization objects?
I know how to create them. But I am confused how does the mapping with their respective DDIC objects work.
I am using Steampunk (ABAP Cloud).
Thanks in Advance.
Request clarification before answering.
... and the respective documentation of the IAM concepts
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Do you know these tutorials?
Create Authorization Model with SAP BTP, ABAP Environment | Tutorials for SAP Developers
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Thank you for the answer. I have seen Authorization Objects being using in Communication Scenario objects, and I am a bit curious in how many ways can these auth objects be used, and how should the auth fields then be defined. But going through both the links, I definitely have better insight now.
| User | Count |
|---|---|
| 9 | |
| 8 | |
| 5 | |
| 4 | |
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.