Answer Posted / rajesh chowdary pendyala
THE ABOVE ANSWER WHICH I POSTED WAS WRONG. EWZ5 IS THE TCODE
NAME
besides sU10 tcode we can also lock mass users in EWZ5 t-code.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain document transfer-level security?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What does the item category specify in a purchasing requisition in SAP Materials Management?
Can you explain snc in sap security?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What is the procedure for role modifications?
How to update risk id in rule set?
What is the difference between role and a profile?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
how we can see FFID if firefighter not able to see FFids ?
When would you update a sap table directly? What precautions would you taje?
How do you check background jobs?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.