What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?
Answer Posted / abdul habeeb ur rahman
When ever the user execute the t.code first it will check
the authentication then it will checkes in su56 user
buffer authorization , if it exsist in su56 then after it
will check for t.code lock in SM01, if there is no lock in
SM01, then it will checks authorization program check in
S_Tcode , then after tcode will be checked in TSTCA Table
last it will be checked in customised tabe USOBT_C
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
What is the difference between authorization object and authorization object class?
What authorization is required to create and maintain user master records?
What is the difference between the table buffer and the user buffer?
what things you have to take care before executing run system trace?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What are su22 t-codes used for?
what is use of copy data in derived role and when we use this one ???
how we Set up Central User Administration (CUA) to manage 4 systems/clients
What is the difference between c (check) and u (unmaintained)?
what is the process to find that one consultant had removed a table from sap tables
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
what is the use of defaults tab in start menu
Which tables will you use for making customizing setting for security administration?
what is your ticketing tool? can we give some details about how we are getting tickets
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.