Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?

Answer Posted / abdul habeeb ur rahman

When ever the user execute the t.code first it will check
the authentication then it will checkes in su56 user
buffer authorization , if it exsist in su56 then after it
will check for t.code lock in SM01, if there is no lock in
SM01, then it will checks authorization program check in
S_Tcode , then after tcode will be checked in TSTCA Table
last it will be checked in customised tabe USOBT_C

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between authorization object and authorization object class?

1175


What authorization is required to create and maintain user master records?

1153


What is the difference between the table buffer and the user buffer?

1281


what things you have to take care before executing run system trace?

1314


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2484


What are su22 t-codes used for?

1193


what is use of copy data in derived role and when we use this one ???

1858


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2358


What is the difference between c (check) and u (unmaintained)?

1947


what is the process to find that one consultant had removed a table from sap tables

2573


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3243


what is the use of defaults tab in start menu

1947


Which tables will you use for making customizing setting for security administration?

1230


what is your ticketing tool? can we give some details about how we are getting tickets

1662


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2631