Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How can we Lock transaction ? What happens exactly ?

Answer Posted / shanu

SM01 transaction can use to lock the transactions,we can
lock one or many at a time in the system.

When a user starts a transaction, the system system checks
in table TSTC whether the transaction code is valid and
whether the system administrator has locked the
transaction.

Is This Answer Correct ?    20 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is the main difference between the derived role and a single role?

1199


How to assign any program to user?

1694


what is the difference between usobt_c and usobx_c?

1404


What is the difference between role and a profile?

1379


What is audit information system?

1175


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2485


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2288


User is not there in User master record. Then how to trace the user?

1512


What is the difference between authorization object and authorization object class?

1177


explain the personalization tab within a role?

1434


How can sap security be improved?

1175


Which transaction code is used to display the user buffer?

1239


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2206


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7245


what are all the questions covered in "profiles related concepts " please let me know ?

2165