What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?
Answers were Sorted based on User's Feedback
Answer / sandy
We can lock T-code by transaction code SM01.whenever user
tries to access locked T-code, the system will check if the
T-code is valid. If yes it will check whether T-code is
locked and if locked it will throw an error message that
T-code is locked. T-code is locked universally for all users.
Is This Answer Correct ? | 12 Yes | 2 No |
Answer / raghuram
when ever user executed a transaction in background it will
check for that particular transaction from TSTC table if it
is locked it will show the error message particular
transaction is locked
Is This Answer Correct ? | 1 Yes | 1 No |
Answer / abdul habeeb ur rahman
When ever the user execute the t.code first it will check
the authentication then it will checkes in su56 user
buffer authorization , if it exsist in su56 then after it
will check for t.code lock in SM01, if there is no lock in
SM01, then it will checks authorization program check in
S_Tcode , then after tcode will be checked in TSTCA Table
last it will be checked in customised tabe USOBT_C
Is This Answer Correct ? | 1 Yes | 1 No |
How we do Scheduled jobs in background to cleanup spool request, dumps
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
How to access sap security throw internet?
What are st01 t-codes used for?
HI FRIENDS, Can anybody tell me which is best institute in Hyderabad or bangalore for SAP GRC COURSE.How much duration and cost? Regards, sandy...@
what is the use of defaults tab in start menu
Hi I cleared all rounds of Accenture but my preffered location was Gurgaon, as they dint had anything for me in Delhi /NCR they have put me on hold. I am worried will they call me again. please help
hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
How will you mitigate a user against an authorization object which is decided as sensitive by Business
what is the landscape of GRC
What is the different between single role & composite role?
. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?