Answer Posted / rajesh chowdary pendyala
besides sU10 tcode we can also lock mass users in EZW5 t-code.
| Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
Which t-code can be used to delete old security audit logs?
What appears as the last sentence in sap note 587410?
What are su53 t-codes used for?
How to find ECC system, GRC system and BI system ?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what is sod in sap security?
User is not there in User master record. Then how to trace the user?
What is t code?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
How can I do a mass delete of the roles without deleting the new roles?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
Can you explain sap system transactions?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?