Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?

Answer Posted / sandy

We can lock T-code by transaction code SM01.whenever user
tries to access locked T-code, the system will check if the
T-code is valid. If yes it will check whether T-code is
locked and if locked it will throw an error message that
T-code is locked. T-code is locked universally for all users.

Is This Answer Correct ?    12 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain x-glueb and its use in sap security.

1291


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1267


Can you explain secure store and forward?

1006


what is authorization object and authorization object class?

1195


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

994


when performing client copies what steps you need to take from CUA point of view?

2510


Which transaction code is used to display the user buffer?

1142


how we can see FFID if firefighter not able to see FFids ?

1981


What authorization are required to create and maintain user master records?

1066


What does user compare do?

1158


What profile versions?

1152


Can you explain document transfer-level security?

1074


Differentiate between temp role and copy role

1134


What are the most used tables in sap?

1161


what is the process to find that one consultant had removed a table from sap tables

2490