Do you have any question about this t-code?
Transaction Code: FZ37
Description: Customizing conversion extern.roles
Release: S/4HANA and ECC 6
Program:
Screen: 0
Authorization Object:
Development Package: FVVM
Package Description: R/3 appl.dev. for Financial Assets Management: Migration
Parent Package: APPL
Module/Component: FI-AA
Description: Asset Accounting
Overview: The SAP transaction code FZ37 is used to customize the conversion of external roles. This code is used to convert external roles into internal roles in the SAP system. It is used to assign authorization profiles to users and to assign authorization objects to roles. Functionality: The FZ37 transaction code allows users to customize the conversion of external roles into internal roles in the SAP system. This code is used to assign authorization profiles to users and to assign authorization objects to roles. It also allows users to create and maintain authorization profiles, which are used to control access to certain functions in the system. Step-by-step How To Use 1. Enter the transaction code FZ37 in the command field. 2. Select the “Customizing Conversion Extern.Roles” option from the menu. 3. Select the “Create/Maintain Authorization Profiles” option from the menu. 4. Enter the name of the authorization profile you want to create or maintain. 5. Select the “Assign Authorization Objects” option from the menu. 6. Select the authorization objects you want to assign and click “Save”. 7. Select the “Assign Authorization Profiles” option from the menu. 8. Select the authorization profiles you want to assign and click “Save”. 9. Click “Back” or “Exit” when you are finished customizing your external roles conversion into internal roles in SAP system. Other Recommendations: It is important that users understand how authorization profiles work before using this transaction code, as it can be difficult to troubleshoot any issues that arise if they do not understand how it works properly. Additionally, it is important that users are aware of any security risks associated with assigning authorization profiles, as this could potentially lead to unauthorized access of certain functions in the system if not done correctly.