Answer Posted / martin mylabathula.....
This is one way to lock the users by executing Tcode EWZ5.
another way is by executing su10... authoriztion tab....
evaluate the users list......... transfer...... execute
| Is This Answer Correct ? | 19 Yes | 0 No |
Post New Answer View All Answers
What is sap cryptographic library?
What is the use of su56?
What is Sap security t-codes?
How to find out who has deleted users in the system?
Tell me about derived role?
what is the use of defaults tab in start menu
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
List the various user types.
What is the difference between the table buffer and the user buffer?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
You want to remove a developer's and developer keys from a system. How would you do that?
Explain network topology in sap systems?
what is user buffer?
Can you explain protecting public keys?
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.