(1)Difference between usobt_c and usobx_c?(2)What are usobt
and usobx tables for?(3)Difference between usobt and
usobt_c?(4)Se93.How u create custom t-codes?(5)Difference
b/w customizing request and workbench request?(6)To trnsprt
sU24 setting which is used is it customizing or workbench
request?(7)If we add org level elements in a master role
will it reflect in child role and how AGR_1252 will act as
a barrier?(8)How to do mass user to role assignment using
secatt, will u use su01 or su10?Explain why you will use
SU10 not SU01?(9)Can SU10 can be used for mass password
reset?Why not?(10)If you want to reset the password for say
100 users in Production how will you do?(11)Expalian Steps
2A and 2B in SU25?
Answer Posted / raj
all the above answers are correct except 6th
For transporting SU24 changes we need to have a workbench request as it is client independent settings.
| Is This Answer Correct ? | 15 Yes | 1 No |
Post New Answer View All Answers
What authorization is required to create and maintain user master records?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is use of copy data in derived role and when we use this one ???
what is hypercare and go live support?
Support types of WOs you have faced?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Explain x-glueb and its use in sap security.
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
What is use of derived roles?
How to find out who has deleted users in the system?
List the various user types.
could anyone tell me how we can copy the mass roles from sap_all profiles???????
what is the different b/w su10 and su12
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What is Sap security t-codes?