Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

how can we get the email address for multiple users at a time.

Answer Posted / shabareesh

First will get the users person no from ADR6 Table and will give those person nos in USR21. so that will get the list of users email ids.

correct me if it is wrong.

Is This Answer Correct ?    0 Yes 12 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the use of Personalization tab in SU01?

5691


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2135


How to find out who has deleted users in the system?

1181


By which parameter number of entries are controlled in the user buffer?

1402


What is sap internet transaction server?

1184


Can you explain protecting public keys?

1069


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2351


What is t code?

1127


What are st01 t-codes used for?

1155


Can you explain transport system-level security?

1245


what is the difference between usobt_c and usobx_c?

1355


What is stad?

1176


What are the different types of sap security tables?

1113


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2345


Explain protecting public keys?

1274