Could you please let me know the exact step by step process
for the following Questions.
1.How to get the E-Mail address for 100 users at a time.
2.While Creating BW roles what are the Authorization Objects
we will use.
3.While Creating Single role what will be happened in the
functional side, when entered the Template role in the
derived role tab.
4.when we changed the password for more users(for
example:100 users) where the password will be stored or from
where you can Re-Collect the password and how will you
Communicate the password to all users at a time.
5.What is Virsa? Once you entered in to the screen what it
will perform.
6.What is the use of SU24 & SM24.
7.While Creating BW roles what are the Authorization Objects
we will use.
8.While Creating Single role what will be happened in the
functional side, when you entered the Template role in the
derived role tab.
9.What is Dialog users, Batch users and Communicate users.
What is the use with Communicate user.
10.Can we add one Composite role in to another Composite
role at any urgent user requests or in normal user requests.
11.In Transport what type of Request we will use.Why don't
we use Workbench request in transport.
12.When we added Authorization Object in Template role, at
the same time what will be happen in Derived role.
13.How to Check Profile parameter. And how to find whether
any transport has ended with error and where we can check.
14.How to Extract users list like who didn't login since 3
months. And In 90 Days user Locking in which table we will use.
15.What is OSS Connection and System Opening and why we have
to open these.
16.What will have in one single role and how many prifiles
will be in one sap cua system.
17.What is the difference between Template role & Derive role.
Answer Posted / chandrana
1.How to get the E-Mail address for 100 users at a time.
Ans: To get email address of the no. of users go to se16-
>ADR6->give the person number or Address number.
To get the Addres number or Person number go to the
tableUSR21 extract the data of the users.
| Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
What is the procedure for role modifications?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What does the item category specify in a purchasing order in SAP Materials Management?
what is user base in sap security?
How to do Role Design, Testing and Implementation
explain the personalization tab within a role?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
What is the use of tmssup* rfc destinations?
Can you explain protecting public keys?
Can wildcards be used in authorizations?
How to find out who has deleted users in the system?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.