Answer Posted / rajesh chowdary pendyala
THE ABOVE ANSWER WHICH I POSTED WAS WRONG. EWZ5 IS THE TCODE
NAME
besides sU10 tcode we can also lock mass users in EWZ5 t-code.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Which tables will you use for making customizing setting for security administration?
You want to remove a developer's and developer keys from a system. How would you do that?
How to codify for an Item in SAP? How many digits are required for an item?
what is the main difference between the derived role and a single role?
What are pfud t-codes used for?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
User is not there in User master record. Then how to trace the user?
explain the personalization tab within a role?
What is the procedure for role modifications?
What authorization is required to create and maintain user master records?
What is sap internet transaction server?
what is sod in sap security?
Can you explain secure store and forward?
What are su25 t-codes used for?