Could you please let me know the exact step by step process
for the following Questions.
1.How to get the E-Mail address for 100 users at a time.
2.While Creating BW roles what are the Authorization Objects
we will use.
3.While Creating Single role what will be happened in the
functional side, when entered the Template role in the
derived role tab.
4.when we changed the password for more users(for
example:100 users) where the password will be stored or from
where you can Re-Collect the password and how will you
Communicate the password to all users at a time.
5.What is Virsa? Once you entered in to the screen what it
will perform.
6.What is the use of SU24 & SM24.
7.While Creating BW roles what are the Authorization Objects
we will use.
8.While Creating Single role what will be happened in the
functional side, when you entered the Template role in the
derived role tab.
9.What is Dialog users, Batch users and Communicate users.
What is the use with Communicate user.
10.Can we add one Composite role in to another Composite
role at any urgent user requests or in normal user requests.
11.In Transport what type of Request we will use.Why don't
we use Workbench request in transport.
12.When we added Authorization Object in Template role, at
the same time what will be happen in Derived role.
13.How to Check Profile parameter. And how to find whether
any transport has ended with error and where we can check.
14.How to Extract users list like who didn't login since 3
months. And In 90 Days user Locking in which table we will use.
15.What is OSS Connection and System Opening and why we have
to open these.
16.What will have in one single role and how many prifiles
will be in one sap cua system.
17.What is the difference between Template role & Derive role.
Answer Posted / chandrana
1.How to get the E-Mail address for 100 users at a time.
Ans: To get email address of the no. of users go to se16-
>ADR6->give the person number or Address number.
To get the Addres number or Person number go to the
tableUSR21 extract the data of the users.
| Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
How we schedule and administering background jobs?
What authorization are required to create and maintain user master records?
What does the pfcg_time_dependency clean up?
Tell me about derived role?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
what is the critical issue u are faced in your previous experience
how to do Reporting and Analysis authorizations
Explain sap system transactions?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How do we test security systems.
what are the issues you faced with UME?
What profile versions?
Explain network topology in sap systems?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
In pfcg where we can add customized t-codes. And where we can see customized t-codes