(1)Difference between usobt_c and usobx_c?(2)What are usobt
and usobx tables for?(3)Difference between usobt and
usobt_c?(4)Se93.How u create custom t-codes?(5)Difference
b/w customizing request and workbench request?(6)To trnsprt
sU24 setting which is used is it customizing or workbench
request?(7)If we add org level elements in a master role
will it reflect in child role and how AGR_1252 will act as
a barrier?(8)How to do mass user to role assignment using
secatt, will u use su01 or su10?Explain why you will use
SU10 not SU01?(9)Can SU10 can be used for mass password
reset?Why not?(10)If you want to reset the password for say
100 users in Production how will you do?(11)Expalian Steps
2A and 2B in SU25?

Answer Posted / srikanth g

(1)Difference between usobt_c and usobx_c?
Answer: Table USOBX_C defines which authorization checks
are to be performed within a
transaction and which are not.This table also determines
which authorization checks are maintained in the Profile
Generator.
Table USOBT_C defines for each transaction and for each
authorization object which default values an authorization
created from
the authorization object should have in the Profile
Generator.
(2)What are usobt and usobx tables for?
Answer: SAP delivers the tables USOBX and USOBT. These
tables are filled with default
values and are used for the initial fill of the customer
tables USOBX_C and USOBT_C.
(3)Difference between usobt and usobt_c?
Answer: USOBT is SAP delivered table where as USOBT_C is
customer table. After the initial fill,
you can modify the customer tables, and therefore the
behavior of the Profile Generator, if required.
(4)Se93.How u create custom t-codes?
Answer: Yes we can create custom t-code in SE93.
(5)Difference b/w customizing request and workbench request?
Answer: Cusomizing request is client denpendent. Work bench
request is client independent.
(6)To trnsprt sU24 setting which is used is it customizing
or workbench request?
Answer: Its a customizing request.
(7)If we add org level elements in a master role will it
reflect in child role and how AGR_1252 will act as a
barrier?
Answer: Org level elements does not effect in child
roles.AGR_1252 show the information of Org.values related
to role.
(8)How to do mass user to role assignment using secatt,
will u use su01 or su10?Explain why you will use SU10 not
SU01?
Answer: We can assign role to mass users using SU10. We can
do the same with SECATT.
(9)Can SU10 can be used for mass password reset?Why not?
Answer: Password reset option not available in SU10 for
mass user maintainance
(10)If you want to reset the password for say 100 users in
Production how will you do?
Answer:We can use SAP GUI scripts or SECATT to do it.
(11)Expalian Steps 2A and 2B in SU25?
Answer: 2A -->This compares the Profile Generator data from
the previous release with the data
for the current release. New default values are written in
the customer tables for
the Profile Generator. You only need to perform a manual
adjustment later (in step
2B) for transactions in which you changed the settings for
check indicators and
field values. You can also display a list of the roles to
be checked (step 2C).
2B-->If you have made changes to the check indicators or
field values in transaction
“SU24”, you can compare these with the new SAP defaults.
You can see the
values delivered by SAP and the values that you changed
next to each other, and
can make an adjustment, if desired. You can assign the
check indicators and field
values by double-clicking the relevant line.

Is This Answer Correct ?    10 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between c (check) and u (unmaintained)?

1101


what is your ticketing tool? can we give some details about how we are getting tickets

1161


What is stad?

737


how you can delete multiple roles from qa, dev and production system?

822


How to do Role Design, Testing and Implementation

2043






Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

678


Pfcg proposed activities but you need only two. What would you do?

673


What are st01 t-codes used for?

732


Explain internet-level security?

645


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

1646


What are the different types of sap security tables?

671


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1795


By which parameter number of entries are controlled in the user buffer?

912


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1860


How to assign any program to user?

1066