which table is used to store illegal passwords?

Answer Posted / divakarknv

Usr40

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2235


What is sap cryptographic library?

640


Can you explain snc in sap security?

650


how you can delete multiple roles from qa, dev and production system?

817


What is the maximum number of profiles in a role and maximum number of object in a role?

626






How to do Role Design, Testing and Implementation

2039


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1791


What are su25 t-codes used for?

698


Explain secure store and forward?

627


How do we test security systems.

654


What is the main purpose of parameters, groups & personalization tabs?

647


What does the item category specify in a purchasing requisition in SAP Materials Management?

1086


what is your ticketing tool? can we give some details about how we are getting tickets

1159


How we Educated client personnel in R/3 Security and general Basis knowledge

1800


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

657