How to restrict users who can use a submit button.

I have a submit button which I would like to limit the names of the users who can use it. Is there any way I can limit who can use it.
Thanks

Hi
Use SUIM and find the users have this authorization.
Here the first tab user--list of users with critical authorization select that and u can find the users list.
Regards
Bhaskar
Edited by: bhaskar1818 on Jul 22, 2008 2:32 PM

Similar Messages

  • How to get users, who can use special T-code?

    Hi.
    I want to know users, who has authorization for FBV0.
    How can I get this information?
    Thank you in advance..

    Hi
    Use SUIM and find the users have this authorization.
    Here the first tab user--list of users with critical authorization select that and u can find the users list.
    Regards
    Bhaskar
    Edited by: bhaskar1818 on Jul 22, 2008 2:32 PM

  • How to set the user who can access to repository

    Hi,
    I know we can create user and group in the tools->security.And if this users is belong to Administrators Group, it can access to RPD and do some modify..
    Can we create group or user who can access RPD in some situation(like mentioned in HELP, A can access to repository on Mondays and Wednesdays, B can access to repository on Saturdays and Sundays) and how to set the privilege..
    Thanks
    anne

    Hi Anne,
    The example specified in Help is about restricting query execution on weekdays/weekends for a particular webgroup. Inorder to configure such access ,
    Double click on the web group name -> Query Limits tab ->Click on Restrict button provided against the physical connection pool ->Select Allow/Disallow by selecting a particular time period.
    Rgds,
    Dpka

  • [HELP] How to records user who use SQLPlus or SQL editor?

    Dear Gurus,
    Is onyone know how to record user who use SQLplus or any SQL editor?
    for instance...
    user1 using SQLplus on monday august 9.30.21 PM...and I have table which record this for audit user.
    Or..
    Can I block user who connect to oracle using SQLPlus?
    If anyone know how to do this..please inform me...
    Thanks and Regards
    Erie

    You can enable Auditing (AUDIT_TRAIL) and audit at the Session Level to record Logon and Log off of a required user. This can be enabled to be recorded in the audit table or operation system file. You can also audit user statements etc.
    For example, to enable auditing connect for user UGONIC
    SQL>audit connect by UGONIC;
    TO disable it
    SQL>noaudit connect by UGONIC;
    Check in the SQL Reference for the AUDIT statement and requirements.
    If you do not want the user to connect at all via SQL*Plus, you can use PRODUCT_USER_PROFILE to disable a users access to SQL*Plus or at the lower level, disable specified SQL*Plus and SQL commands for the user. You need to run the PUPBLD.SQL script as system user (if not run yet) and add records to it as required.
    Example: After running PUPBLD.SQL. This entry stops the user UGONIC from using the drop command at the backend in SQL*Plus.
    INSERT into product_user_profile (product,userid,attribute,char_value,date_value)
    values('SQL*Plus','UGONIC','DROP','DISABLED',NULL);
    Note that if a user is already connected by the profile entry, it is not activated on that session, but on subsequent logons. Again read the requied security documentations for this.
    For both auditing, you need to set the required database intialisation parameters and know where to get the audit records (in tables, views or OS file). For instance, when using tables, you maintain and query tables like audit$ to view the logs. When using OS type logging, it is recorded on the path specified in the AUDIT_FILE_DEST init parameter (In Windows, it is logged in the Windows Event and you can view it from the event viewer).

  • How to craete a user who can only browse the dashboard??

    Hi friends,
    How to create a test user who can only browse the dashboards and not able to modify any of the reports using answers??
    Please tell me the steps.
    Thanks

    @Alastair: I thought it'd be nice to start a new trend in the forum.
    @bob123: Depends on how you manage your user and groups in general. Everything created in the RPD? Read from some Oracle tables? LDAP/ADSI? You can do it in the RPD, in the web catalog (Edit Group -> Group Membership ==> The table below contains a list of the current members of this group. Users can join the group by entering the group's password from the Join Catalog Group screen, or you can manually add them by clicking Add New Member below.) or outside.

  • Can't audio chat with another Mac user who is using AIM

    Can't audio chat with another Mac user who is using AIM but I can when they are using iChat. Is there a way that I can fix this problem.

    The Mac OS X version of AIM is not capable of audio or video chats. There is no way around this.
    (14088)

  • I have a requirement where I have to give the list of users who can access a specific computer. I am new with PS. Do you have a script to list users that can access a computer object of AD ?

    I have a requirement where I have to give the list of users who can access a specific computer define in AD.
    I am new with PS.
    Do you have a script to list users that can access a computer object of AD ?
    I have executed the following script  but it does not give me the access rights of who can access the computer 'computername'
    How can i have this information. please help
    Import-Module activedirectory
    $computer=get-adcomputer "computername" -properties ntSecurityDescriptor
    $omputer.ntsecurityDescriptor.Access | select-object -expandproperty IdentityReference | sort-object -unique

    I would say that, since the OP has so little info, there are no policies in use.  It there were then this question would never be asked the way it is being asked.
    I had a client call with a letter from their insurance company; an accountant with malpractice insurance.  THey asked the same question inmuch the same way.  "What computer can you users access?"  The question should be more like
    "Do you have a policy that restricts access to computers and do you audit for compliance?"
    I have had other clients whose insurance asked the question in that way.  It produces a better view of what should be happening and how to show compliance.
    I recommend that companies being asked these questions by their legal departments or insurance companies should contract with a god computer security consultant to assist with answering these very tricky questions.  Of course if it is just you boss's
    curiosity  then you may need to discuss his requirements with him in more depth.
    ¯\_(ツ)_/¯

  • How to restrict user to change original file in word document.

    Hi experts,
    I am begineer in DMS. I am not able to understand how to restrict user to make any changes to a word document attached any DIR or any object link.
    Ex: I have a created a DIR attaching a word doc to equipment master.
    However, the user is still able to make changes to that word document usign CV03 tcode. I am sure most of you might have faced this problem. Please respond.
    We are using SAP 3.1i version. It is very old version.
    Thanks in advance,
    Kiran

    Kiran,
           The task that you have mentioned could be accomplished by setting up a status network for your document type. While setting up the status network, SAP has defined statuses which could potentially lock objects and fields corresponding to that status type.
    More information could be found at
    http://help.sap.com/erp2005_ehp_03/helpdata/EN/9f/857f3a1c7b11d294d200a0c92f024a/frameset.htm
    I am not aware of 3.0i but you can navigate to customisation --> Cross Application Components --> Document Management --> Control Data --> Define Document Types --> Click on a doc type and go to
    define doc status.
    Here if you define a document with status type S the object is essentially locked for editing.
    Sojan

  • How to restrict user at selection screen while executing in background mode

    hi all,
    how to restrict user at selection screen while executing in background mode
    Regards
    Deepak

    Hi,
    We can get the Program whether this is running in background or not then we need to use SY-BATCH, if the SY-BATCH is set to X then the program is running in Background,
    so in the INITIALIZATION event, you can use this SY-BATCH and check the User names, and give the error messsage which you want to restrict
    Regards
    Sudheer

  • How to find users who are running IE with different credentials ?

    How to find users who are running IE with different credentials ? 
    Is there any tool or a solution in the market will help or a i can use GPO or even Power Shell ?
    thnx & Regards ,,

    Hi Salman,
    Based on your description, we can use Windows Credential Manager to check this. Windows Credential Manager stores credentials, such as user names and passwords  that we use to log on to websites or other computers on a network.
    Regarding Credential Manager, the following article can be referred to for more information.
    Credential Manager
    http://windows.microsoft.com/en-in/windows7/what-is-credential-manager
    Manage passwords in Internet Explorer using Credential Manager
    http://www.thewindowsclub.com/manage-passwords-internet-explorer-10
    Please Note: Since the above website is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.
    Best regards,
    Frank Shen

  • Why is there a guest account who can use safari in my login window???

    why is there a guest account who can use safari in my login window when i completely disabled the guest account. I disabled the guest account so others wont be able to use the internet, specifically safari, on my mac, as a form of security/parental control and now anyone who wants to go online csn do so.
    how could i completely remove that out of my login window?

    Security enthusiasts highly recommend keeping the Guest User Safari account enabled so that if you happen to lose your Mac, or if it’s stolen, it could easily be tracked down.
    The first thing most thieves do is turn on the device to see if it works, and/or access your information, or surf the internet. Once it connects to the internet, you now have an opportunity to start collecting data that could eventually lead to the device recovery and thief capture.
    This is not a full guest user account, if you select the Guest User option at login, the Mac will restart to a secured Safari-only version of the OS with access to the internet. So what’s the point of this? It turns out this is part of setting up iCloud in Mac OS X, specifically the “Find My Mac” feature. The Safari Guest User allows someone to get online so the Mac can be located, but prevents the Safari user from accessing your files and applications.

  • VS 2013 Community Edition who can use it?

    Hello,
    I'm working in non-software company but we want to develop some applications exclusively for our needs not to sell to others. There is about 20 PCs and company's annual revenue is more than $1MM.
    We want to develop software only for our needs and software will be used only insde our organization, software is not open source and will be not published anywhere else except in our company.  Can we use Visual Studio 2013 Community Edition
    in this case?

    If you are an enterprise organization, you cannot use the Community Edition. The fact that your company does not develop and publish software is not alter the revenue limit.
    My opinion based on:
    "Who can use Visual Studio Community?          
    A: Here’s how individual developers can use Visual Studio Community:
    Any individual developer can use Visual Studio Community to create their own free or paid apps.
    Here’s how Visual Studio Community can be used in organizations:
    An unlimited number of users within an organization can use Visual Studio Community for the following scenarios: in a classroom learning environment, for academic research, or for contributing to open source projects.
    For all other usage scenarios: In non-enterprise organizations, up to 5 users can use Visual Studio Community.
    In enterprise organizations (meaning those with >250 PCs
    or > $1MM in annual revenue), no use is permitted beyond the open source, academic research, and classroom learning environment scenarios described above."
    If this explanation is still not clear, because your issue is about Visual Studio Community Edition 2013 license, I suggest that
    you can call 1-800-426-9400, Monday through Friday, 6:00 A.M. to 6:00 P.M. (Pacific Time) to speak directly to a Microsoft licensing specialist.

  • How to find user who loaded the procs in DB

    Hi guys how to find user who loaded procs in database ..and the date...
    is there anyway..
    i tried to look at all_objects..but it didnot workout..
    thanks

    That is correct. You will only have audit rows for item that you are auditing. I am suggesting you audit all DDL in a production database since production jobs should not perform DDL with the probable exception of truncate. This will provide this type of information going forward. It will not help you answer the question of who created the procedure last week?
    Auditing is explained in the Security manual and the full comand syntax is available in the SQL manual.
    You can easily write a purge the audit data to remove data once it is no longer of interest based on the date the audit row was created.
    HTH -- Mark D Powell --

  • How to restrict users working on Windows 7 clients from accessing Windows Explorer and other systems in the network through Group Policy with a domain controller running on Windows Server 2008 r2

    Dear All,
    We are having an infrastructure setup of around 500 client computers managed through group policy.
    Recently the domain controllers have been migrated from Windows Server 2003 to Server 2008 R2.
    Since this account requires extremely strict environment, we need to figure the solution for restricting the users from access anything locally.
    It would be great if you can assist me with the following query.
    How to restrict users logged on Windows 7 clients from accessing Windows Explorer and browsing other systems in the network through Group Policy with a domain controller running on Windows Server 2008 r2 ?
    Can we disable Network Tab on the left hand pane ?
    explorer.exe is blocked already, but users are able to enter the Windows Explorer by clicking on the name which is visible on the Start Menu.

    >   * explorer.exe is blocked already, but users are able to enter the
    >     Windows Explorer by clicking on the name which is visible on the
    >     Start Menu.
    You cannot block explorer.exe when you do not replace the shell - the
    desktop you see effectively IS explorer.exe...
    Your requirement sounds like you need a custom shell:
    http://gpsearch.azurewebsites.net/#2812
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • !!!How to restrict user for making  changes in Sales order , partner level

    Hi all,
    Can anybody tell me how to restrict user for making  changes in Sales order  at partner level, is it through user exit?

    Hi Ruchi
    I hope u had gone to the screen fields which u want them not to be editable. So there u select all the fields contents which u do not want to to be changed and check the boxes with W.content and Display and save it. Once evrything is done u have to activate the particular transcation going in to the standard variants and put the name and click the activate button.
    Hope its clear
    Reward if help ful
    Sri

Maybe you are looking for