Answer Posted / martin mylabathula.....
This is one way to lock the users by executing Tcode EWZ5.
another way is by executing su10... authoriztion tab....
evaluate the users list......... transfer...... execute
| Is This Answer Correct ? | 19 Yes | 0 No |
Post New Answer View All Answers
What is the difference between authorization object and authorization object class?
Which tables will you use for making customizing setting for security administration?
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What does the account assessment category specify in a purchasing document in SAP Materials Management?
what is hypercare and go live support?
Explain network topology in sap systems?
Can you explain secure store and forward?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Explain transport system-level security?
What is Sap security t-codes?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What are pfud t-codes used for?
Can you explain protecting public keys?
what is the main difference between the derived role and a single role?