Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

in how many roles a T-code exists?
Find it without se16 or suim

Answer Posted / pavithran438

Goto SE38
Run RSUSR070
Give the Tcode and Execute
You will get the list of Roles Which consists that tcode

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2158


By which parameter number of entries are controlled in the user buffer?

1402


How to run the daily background job s for virsa violations ? thabks in advance

3659


How do you check background jobs?

1190


Explain sap system transactions?

1180


Tell me about derived role?

1079


how a t code works

2453


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

2291


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1971


Can you explain network topology in sap systems?

1117


What is t code?

1127


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

1254


Differentiate between derived role and composite role

1172


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1190


What is the difference between c (check) and u (unmaintained)?

1886