Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?

Answer Posted / abdul habeeb ur rahman

When ever the user execute the t.code first it will check
the authentication then it will checkes in su56 user
buffer authorization , if it exsist in su56 then after it
will check for t.code lock in SM01, if there is no lock in
SM01, then it will checks authorization program check in
S_Tcode , then after tcode will be checked in TSTCA Table
last it will be checked in customised tabe USOBT_C

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is sap internet transaction server?

1184


How to codify for an Item in SAP? How many digits are required for an item?

2659


what is the critical issue u are faced in your previous experience

1939


what is sod in sap security?

1232


What are the different types of sap security tables?

1109


Explain snc in sap security?

1191


how we do CUA configuration in Quality system

2436


what is user base in sap security?

1715


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

2329


Can wildcards be used in authorizations?

1203


Can you explain protecting public keys?

1066


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2369


Explain document transfer-level security?

1131


Support types of WOs you have faced?

2304


What is the procedure for role modifications?

1190