SAP Security (BC-SEC) Tables

TableDescriptionModule
TACTActivities which can be ProtectedBC-SEC
TBRGAuthorization groupsBC-SEC
TC70Digital signature: SSF information about the userBC-SEC
TOBCClass assignment of authorization objectsBC-SEC
TOBJAuthorization ObjectsBC-SEC
AUTHXAuthorization Fields (Maintain with SU20)BC-SEC
DBOBJComposition of Hybrid ObjectsBC-SEC
SUKRITransaction Combinations Critical for SecurityBC-SEC
TACTTActivities that can be protectedBC-SEC
TACTZValid activities for each authorization objectBC-SEC
Show More SAP BC-SEC Tables