(1)Difference between usobt_c and usobx_c?(2)What are usobt
and usobx tables for?(3)Difference between usobt and
usobt_c?(4)Se93.How u create custom t-codes?(5)Difference
b/w customizing request and workbench request?(6)To trnsprt
sU24 setting which is used is it customizing or workbench
request?(7)If we add org level elements in a master role
will it reflect in child role and how AGR_1252 will act as
a barrier?(8)How to do mass user to role assignment using
secatt, will u use su01 or su10?Explain why you will use
SU10 not SU01?(9)Can SU10 can be used for mass password
reset?Why not?(10)If you want to reset the password for say
100 users in Production how will you do?(11)Expalian Steps
2A and 2B in SU25?
Answer Posted / ashwini
Password reset can be done by su10 , but only system
generated password is possible and no manual.and also no
export file option to download the different password
generated by system.so its not the preferred option , so
best is to use SECATT script option.
Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
What is the maximum number of profiles in a role and maximum number of object in a role?
Tell me about derived role?
what are all the questions covered in "profiles related concepts " please let me know ?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
what is use of copy data in derived role and when we use this one ???
User is not there in User master record. Then how to trace the user?
what things you have to take care before executing run system trace?
How to find ECC system, GRC system and BI system ?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What are the upgrades happened in GRC 5.3 from GRC 5.2?
what is the process to find that one consultant had removed a table from sap tables
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the use of tmssup* rfc destinations?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
Can you explain internet-level security?