Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How can you lock all the users at a time?

Answer Posted / martin mylabathula.....


This is one way to lock the users by executing Tcode EWZ5.

another way is by executing su10... authoriztion tab....
evaluate the users list......... transfer...... execute

Is This Answer Correct ?    19 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between authorization object and authorization object class?

1128


Which tables will you use for making customizing setting for security administration?

1155


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

1143


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1371


what is hypercare and go live support?

5333


Explain network topology in sap systems?

1091


Can you explain secure store and forward?

1051


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1246


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2366


Explain transport system-level security?

1157


What is Sap security t-codes?

1218


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2343


What are pfud t-codes used for?

1249


Can you explain protecting public keys?

1063


what is the main difference between the derived role and a single role?

1150