Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How will you delete the user in sap security SU01

Answer Posted / venkat

usually it is not good practice to delete user. remove all roles of user and deactivate password lock user and move to inactive user group.

Is This Answer Correct ?    10 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

2548


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4259


what is the difference between usobt_c and usobx_c?

1407


How to update risk id in rule set?

1226


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

1446


What is the use of Personalization tab in SU01?

5742


How to codify for an Item in SAP? How many digits are required for an item?

2710


What is sap cryptographic library?

1120


how to do Reporting and Analysis authorizations

2533


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1116


Differentiate between temp role and copy role

1256


how we do CUA configuration in Quality system

2486


What is a composite role?

1553


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2396


Can you explain document transfer-level security?

1206