(1)Difference between usobt_c and usobx_c?(2)What are usobt
and usobx tables for?(3)Difference between usobt and
usobt_c?(4)Se93.How u create custom t-codes?(5)Difference
b/w customizing request and workbench request?(6)To trnsprt
sU24 setting which is used is it customizing or workbench
request?(7)If we add org level elements in a master role
will it reflect in child role and how AGR_1252 will act as
a barrier?(8)How to do mass user to role assignment using
secatt, will u use su01 or su10?Explain why you will use
SU10 not SU01?(9)Can SU10 can be used for mass password
reset?Why not?(10)If you want to reset the password for say
100 users in Production how will you do?(11)Expalian Steps
2A and 2B in SU25?

Answer Posted / neha

(6)To trnsprt sU24 setting which is used is it customizing
or workbench request?
I would like to correct it . It should be Workbench

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How we schedule and administering background jobs?

671


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

6392


What is the use of tmssup* rfc destinations?

1754


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2145


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1884






How can I do a mass delete of the roles without deleting the new roles?

864


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3059


Can you explain document transfer-level security?

683


What authorization is required to create and maintain user master records?

683


What is the difference between authorization object and authorization object class?

658


Can you explain secure store and forward?

637


What profile versions?

810


What are su53 t-codes used for?

842


What is the procedure for role modifications?

676


Can you explain protecting public keys?

605