Application management : Authorization : Configuring Authorization : Authorizing the configuration and use of pick lists
Authorizing the configuration and use of pick lists
Authorization for pick lists takes place on two levels, since both the configuration and the use of pick lists can be subjected to authorization.
Moreover, there are two types of pick lists whose configuration and use can be authorized:
Pick list (descriptive)
Pick list (code-descriptive)
To facilitate two types of authorization for two types of pick lists, multiple pick list related business objects are available. Depending on your authorization requirements, you have to enable authorization for one or more pick list related business objects in the Field definer launch group.
For more information on enabling authorization for the business objects that are involved in the configuration of pick lists, refer to Authorizing pick list configuration. For more information on enabling authorization for the business objects that are involved in the use of pick lists, refer to Authorizing end users to use configured pick lists.
Enabling authorization for a business object is step 2 in the Basic Authorization process. For general information on the complete authorization process, refer to Basic authorization.