Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

I want to reset the passwords of 100 users.how do you do it?

Answer Posted / vinod kumar s

Please use SECATT script for mass user password change

Is This Answer Correct ?    7 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What appears as the last sentence in sap note 587410?

1009


what is use of copy data in derived role and when we use this one ???

1727


What is the difference between authorization object and authorization object class?

1081


Support types of WOs you have faced?

2243


what are all the questions covered in "profiles related concepts " please let me know ?

2057


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2524


What is the difference between c (check) and u (unmaintained)?

1784


what is sod in sap security?

1154


You want to remove a developer's and developer keys from a system. How would you do that?

1042


How to assign any program to user?

1532


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7070


What is the procedure for role modifications?

1109


Explain network topology in sap systems?

1034


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3498


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2279