Answer Posted / rajesh chowdary pendyala
besides sU10 tcode we can also lock mass users in EZW5 t-code.
Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
What are su53 t-codes used for?
What happens to change documents when they are transported to the production system?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How to create users?
What is t code?
how to do Reporting and Analysis authorizations
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
what is sod in sap security?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
what things you have to take care before executing run system trace?
Which transaction should not be given to BASIS and DEV team in Production?