Do you have any question about this t-code?
Transaction Code: FOTI17
Description: RETI: Authorizations-Author.Groups
Release: S/4HANA and ECC 6
Program: BUSVIEWS
Screen: 1000
Authorization Object:
Development Package: FVVI
Package Description: R/3 appl.dev. for Financial Assets Management: Real estate
Parent Package: APPL
Module/Component: RE
Description: Real Estate Management
Overview: FOTI17 is a SAP transaction code used to manage authorization groups in the SAP system. It is used to assign authorization groups to users and to maintain the authorization objects assigned to the authorization groups. Functionality: The FOTI17 transaction code allows users to create, change, and delete authorization groups. It also allows users to assign authorization objects to the authorization groups. This ensures that users have the correct access rights for their tasks. Step-by-step How to Use: 1. Enter the FOTI17 transaction code in the command field. 2. Select the “Create” button to create a new authorization group. 3. Enter a name for the new authorization group and select “Save”. 4. Select the “Change” button to change an existing authorization group. 5. Select the authorization group you want to change and select “Save”. 6. Select the “Delete” button to delete an existing authorization group. 7. Select the authorization group you want to delete and select “Save”. 8. Select the “Assign Authorization Objects” button to assign authorization objects to an existing authorization group. 9. Select the authorization group you want to assign objects to and select “Save”. 10. Select the “Display Authorization Objects” button to view all of the assigned objects for an existing authorization group. 11. Select the authorization group you want to view and select “Save”. 12. Select “Back” or “Exit” when you are finished with your changes or viewing of objects for an existing authorization group. Other Recommendations: It is important that users are aware of their access rights when using FOTI17 transaction code, as they may be able to make changes that could affect other users or processes in the system if they do not have sufficient access rights for their tasks. It is also important that users are aware of any changes they make, as these changes could have unintended consequences if not properly managed or monitored by an administrator or other user with sufficient access rights for their tasks in the system.