(1)Difference between usobt_c and usobx_c?(2)What are usobt
and usobx tables for?(3)Difference between usobt and
usobt_c?(4)Se93.How u create custom t-codes?(5)Difference
b/w customizing request and workbench request?(6)To trnsprt
sU24 setting which is used is it customizing or workbench
request?(7)If we add org level elements in a master role
will it reflect in child role and how AGR_1252 will act as
a barrier?(8)How to do mass user to role assignment using
secatt, will u use su01 or su10?Explain why you will use
SU10 not SU01?(9)Can SU10 can be used for mass password
reset?Why not?(10)If you want to reset the password for say
100 users in Production how will you do?(11)Expalian Steps
2A and 2B in SU25?
Answer Posted / neha
(6)To trnsprt sU24 setting which is used is it customizing
or workbench request?
I would like to correct it . It should be Workbench
Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
How we schedule and administering background jobs?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the use of tmssup* rfc destinations?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
How can I do a mass delete of the roles without deleting the new roles?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can you explain document transfer-level security?
What authorization is required to create and maintain user master records?
What is the difference between authorization object and authorization object class?
Can you explain secure store and forward?
What profile versions?
What are su53 t-codes used for?
What is the procedure for role modifications?
Can you explain protecting public keys?