Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?

Answer Posted / abdul habeeb ur rahman

When ever the user execute the t.code first it will check
the authentication then it will checkes in su56 user
buffer authorization , if it exsist in su56 then after it
will check for t.code lock in SM01, if there is no lock in
SM01, then it will checks authorization program check in
S_Tcode , then after tcode will be checked in TSTCA Table
last it will be checked in customised tabe USOBT_C

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

1473


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4452


Can you explain internet-level security?

1131


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3699


When would you update a sap table directly? What precautions would you taje?

1211


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2326


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2128


What profile versions?

1181


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1463


Which tables will you use for making customizing setting for security administration?

1150


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

1048


What are su22 t-codes used for?

1136


Differentiate between usobx_c and usobt_c

1153


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2335


what is the process to find that one consultant had removed a table from sap tables

2533