What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?
Answer Posted / abdul habeeb ur rahman
When ever the user execute the t.code first it will check
the authentication then it will checkes in su56 user
buffer authorization , if it exsist in su56 then after it
will check for t.code lock in SM01, if there is no lock in
SM01, then it will checks authorization program check in
S_Tcode , then after tcode will be checked in TSTCA Table
last it will be checked in customised tabe USOBT_C
Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
What is sap cryptographic library?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
Attributes in SE01?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
Explain secure store and forward?
when performing client copies what steps you need to take from CUA point of view?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
What is the maximum number of profiles in a role and maximum number of object in a role?
What are some ap security t codes?
how we can see FFID if firefighter not able to see FFids ?
How to codify for an Item in SAP? How many digits are required for an item?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
what is the different b/w su10 and su12