Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

i want to delete 1000 users of a particular client,hou can
i do it ?

Answer Posted / djreddy

we can use su10 .. but instead of deleting the users , we have to remove all the authorizations for the users , lock them and move them to INACTIVE User group , this is good for auditing .

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are su25 t-codes used for?

1249


Can you explain transport system-level security?

1244


what is centralize FFID?

2096


Support types of WOs you have faced?

2304


What appears as the last sentence in sap note 587410?

1059


You want to create and maintain user master record. What authorization would you need?

1184


Explain document transfer-level security?

1134


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2157


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4713


What is the procedure for role modifications?

1193


What is sap’s grc?

1183


List the various user types.

1066


What is the use of su56?

1147


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133


Can you explain protecting public keys?

1069