Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

I want to see list of roles assigned to 10 different
users.how do you do it?

Answer Posted / babu

GO to suim -->ROLES-->Byuserassignment

Click multiple selection

Select users ans execute

now you get a list roles assgin to selected users

Is This Answer Correct ?    33 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

You want to remove a developer's and developer keys from a system. How would you do that?

1040


Any details about secatt apart from SAPSecurity online.com?

2262


What are su25 t-codes used for?

1177


What is sap internet transaction server?

1127


what things you have to take care before executing run system trace?

1188


how you can delete multiple roles from qa, dev and production system?

1245


What does the item category specify in a purchasing order in SAP Materials Management?

1327


Tell me about derived role?

1008


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2240


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2279


What is Sap security t-codes?

1148


Which t-code can be used to delete old security audit logs?

1425


Can you explain secure store and forward?

1002


Can you explain protecting public keys?

1007


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1022