Answer Posted / rajesh chowdary pendyala
THE ABOVE ANSWER WHICH I POSTED WAS WRONG. EWZ5 IS THE TCODE
NAME
besides sU10 tcode we can also lock mass users in EWZ5 t-code.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Can you explain document transfer-level security?
How to assign any program to user?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Pfcg proposed activities but you need only two. What would you do?
Tell me about derived role?
You want to remove a developer's and developer keys from a system. How would you do that?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Explain protecting public keys?
Why is it important to delete sap-new profile? What steps will you take to do this?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
How we schedule and administering background jobs?
what is your ticketing tool? can we give some details about how we are getting tickets
What are su56 t-codes used for?