Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Could you please let me know the exact step by step process
for the following Questions.

1.How to get the E-Mail address for 100 users at a time.
2.While Creating BW roles what are the Authorization Objects
we will use.
3.While Creating Single role what will be happened in the
functional side, when entered the Template role in the
derived role tab.
4.when we changed the password for more users(for
example:100 users) where the password will be stored or from
where you can Re-Collect the password and how will you
Communicate the password to all users at a time.
5.What is Virsa? Once you entered in to the screen what it
will perform.
6.What is the use of SU24 & SM24.
7.While Creating BW roles what are the Authorization Objects
we will use.
8.While Creating Single role what will be happened in the
functional side, when you entered the Template role in the
derived role tab.
9.What is Dialog users, Batch users and Communicate users.
What is the use with Communicate user.
10.Can we add one Composite role in to another Composite
role at any urgent user requests or in normal user requests.
11.In Transport what type of Request we will use.Why don't
we use Workbench request in transport.
12.When we added Authorization Object in Template role, at
the same time what will be happen in Derived role.
13.How to Check Profile parameter. And how to find whether
any transport has ended with error and where we can check.
14.How to Extract users list like who didn't login since 3
months. And In 90 Days user Locking in which table we will use.
15.What is OSS Connection and System Opening and why we have
to open these.
16.What will have in one single role and how many prifiles
will be in one sap cua system.
17.What is the difference between Template role & Derive role.

Answer Posted / chandrana

1.How to get the E-Mail address for 100 users at a time.

Ans: To get email address of the no. of users go to se16-
>ADR6->give the person number or Address number.

To get the Addres number or Person number go to the
tableUSR21 extract the data of the users.

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What happens to change documents when they are transported to the production system?

1831


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2088


Explain x-glueb and its use in sap security.

1357


What are the different types of sap security tables?

1113


Explain document transfer-level security?

1135


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1059


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1188


Explain transport system-level security?

1171


explain the personalization tab within a role?

1390


what is the process to find that one consultant had removed a table from sap tables

2537


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2445


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1191


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3705


Which t-code can be used to delete old security audit logs?

1489


what is authorization object and authorization object class?

1270