Users are lockdown from past 3 -4 months. Which table is
used to know that which users are lockdown?
Answers were Sorted based on User's Feedback
Answer / prakash
Use USR02 Table as below
SE16 -> USR02 and execute
Last Logon Date: Date range between 3- 4 months
User lock: 64,32,128
Is This Answer Correct ? | 10 Yes | 0 No |
Answer / parthu
RSUSR200
or
T-code SUIM : Users -> Click on By Logon Date and
password change -> Give * in user and give 90 days in
No.days since last logon and check Locked users and then
EXECUTE
Is This Answer Correct ? | 10 Yes | 2 No |
Answer / rakesh
in se16 open table usr02 and copy users with lock status othr than 0 .then give this users in change documents and execute in that select latest date and difference between the date of execution gives no. of days users locked then select users locked for more than 90 days
Is This Answer Correct ? | 4 Yes | 0 No |
how to assign the selected transaction in role example in the role we have a Two transactions(T1,T2)so we have a users U1,U2. i need to assign the T1 and lock the T2 to U1, and U2 assign the bothT1,T2
What are the mandatory authorization object should have like Reporting user ,power user ,super user and administrator user
How to find ECC system, GRC system and BI system ?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
0 Answers Accenture, HCL, IBM,
Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how
how to delete a single role,the single role is existing with 10 users
Through CTS how we come to know the Role?
what do you mean by profile and obeject
what is user master record and what it contains?
What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one.