Need to know which user has locked the table.

hi ,
We are using a table named fm_sec_dict .when we try to disable the triggers and insert data into the table and enable the triggers asociated with the table.after inserting ,we are getting a message
RESOURCE BUSY ACQUIRED NO WAIT option.
please give the querry to find which user and what SID is using the Table ,so that we can kill the session.
so that other users can work with out any obsturctions.
thanks in advance...........

Check in OEM.

Similar Messages

  • How to find out which user has locked a particular record of a table

    Hi
    Is it possible to know - which user has locked a particular record (I know the primary key of the record) of a table
    Regards

    select     OS_USER_NAME os_user,
         PROCESS os_pid,
         ORACLE_USERNAME oracle_user,
         l.SID oracle_id,
         decode(TYPE,
              'MR', 'Media Recovery',
              'RT', 'Redo Thread',
              'UN', 'User Name',
              'TX', 'Transaction',
              'TM', 'DML',
              'UL', 'PL/SQL User Lock',
              'DX', 'Distributed Xaction',
              'CF', 'Control File',
              'IS', 'Instance State',
              'FS', 'File Set',
              'IR', 'Instance Recovery',
              'ST', 'Disk Space Transaction',
              'TS', 'Temp Segment',
              'IV', 'Library Cache Invalidation',
              'LS', 'Log Start or Switch',
              'RW', 'Row Wait',
              'SQ', 'Sequence Number',
              'TE', 'Extend Table',
              'TT', 'Temp Table', type) lock_type,
         decode(LMODE,
              0, 'None',
              1, 'Null',
              2, 'Row-S (SS)',
              3, 'Row-X (SX)',
              4, 'Share',
              5, 'S/Row-X (SSX)',
              6, 'Exclusive', lmode) lock_held,
         decode(REQUEST,
              0, 'None',
              1, 'Null',
              2, 'Row-S (SS)',
              3, 'Row-X (SX)',
              4, 'Share',
              5, 'S/Row-X (SSX)',
              6, 'Exclusive', request) lock_requested,
         decode(BLOCK,
              0, 'Not Blocking',
              1, 'Blocking',
              2, 'Global', block) status,
         OWNER,
         OBJECT_NAME
    from     v$locked_object lo,
         dba_objects do,
         v$lock l
    where      lo.OBJECT_ID = do.OBJECT_ID
    AND l.SID = lo.SESSION_ID
    hope this helps
    Zekeriya

  • How to know which user has executed which ddl statement

    Hi All,
    Last week i faced some problem, like some one has truncated the table , so luckily i have the schema backup so i restored it till the last backup taken.
    but i want to know who has executed this ddl statement.
    i know there are some utilities are avaible with oracle, so please describe me the easiest and quickest way to get this.
    Regards
    Asif

    In order of descending simplicity
    - Use the principle of least privilege to restrict the privileges users have in the database to ensure that they cannot do things like truncating a table
    - Enable auditing of potentially problematic statements. This has to be done before the damage is done, though
    - Create a DDL trigger that logs when users issue DDL. This also must be done before the damage is done.
    - Use LogMiner to go through the archived log files that were generated at the time the table was truncated. This assumes that the database is in ARCHIVELOG mode and that you have the archived logs from last week. Using LogMiner to track down the culprit is also likely to be relatively time-intensive
    Justin

  • Know if user has closed the Applet?

    I mad this chat without socket connection, so now I want to know if a user has closed the applet where the chat is..... Is this possible ? Can I somehow registre that a user doesnt have the applet running in his computer anymore?

    I assume that the destroy() method of the Applet class will run when the user terminates the applet (however this might take a while after the user navigates from the applet page). Otherwise, the start() and stop() methods could be used for this purpose. Run a test to see when these methods are invoked for your applet (navigating to and fro, shutting down the browser etc.) and figure whether these can do the work for you.

  • Which user has which authorizations

    Hi all,
    I need to know which user has which authorizations.
    In which tables can I find these data?
    Thanks.
    deniz.

    Hi,
        Check this .
    USR01 contains the runtime data of the user master records
    USR02 is the table containing logon information such as the password
    USR03 includes the users' address information
    USR04 contains users' authorizations
    USR05 is the users' parameter ID table
    USR09 contains user menus
    USR10 is the table for user authorization profiles
    USR11 contains the descriptive texts for profiles
    USR12 is the user master authorization values table
    USR13 contains the descriptive short texts for authorizations
    USR14 contains the logon language versions per user
    USR30 includes additional information for user menus
    USH02, USH04, USH10 and USH12 contains Users and profile and
    authorization change history data.
    Tables related with authorizations objects and authorization fields are as follows:
    TOBJ is the authorization objects table containing the authorization
    fields for each.
    TACT contains the list of standard activities authorization fields
    in the system.
    TACTZ is the table which defines the relationship between the
    authorization objects and the activities in those objects containing
    the Activity authorization field.
    TSTC is the transaction code table where authorization objects
    and values can be defined.

  • How to know which user shutdown the server

    Hi,
    Is there a way to check which user has shutdown the server in windows server 2012.
    I know Event Id : 1076,1074,6008 gives information about system shutdown.but want to know which user did that ?
    thanks

    Steps to see which user shutdown the system:
    1. Go to event Viewer
    2. Right click on system and -> Filter Current Log
    3. For User Shutdowns, click downward arrow of Event Sources -> Check User32.
    4. In <All Event IDs> type  1074 -> OK
    This will give the list of Power off and restart events. It will have the date and time as well as Username.

  • Is it possible to determine which user has opened a PDF on a network?

    Hi Everyone.
    We frequently have a situation where users open PDFs saved on the network with Acrobat, and then leave them open.
    Then if other users need to edit the same PDF, they have no way of knowing the PDF is locked until they try to save and get this error:
    "...The file may be read-only or another user may have it open... "
    In this situation it would be useful to be able to interrogate the locked PDF to see which user has locked it open, and maybe to even force close the open session.
    Does anyone know if any of this is possible?
    Many thanks in advance.
    Cheers,
    Andy

    It's not something that Acrobat can show. File 'locks' in Acrobat are not controlled by the application as they are in programs such as Word or InDesign - which write a lockfile to the folder - instead we rely on the server OS to flag each file. Information on who is accessing a file on a network share is only available at operating system level via the machine which hosts the share (e.g. via a net session command).

  • Identifying the procecure/function that has locked a table (or a resource)

    Sometimes, I have a procedure failing saying that a table is locked (yes, I know, it could have been written to diligently wait for it to become available). Is there any system table from where I can figure out which procedure has locked a table and which procedures are waiting to access it, and in what order? I am trying to figure out who are the resource hogs here, and what resources are most hogged.
    Thanks,
    Regards,
    Srini

    Hi Keith,
    This is bit difficult in GUI.
    As mentioned by Mandy, try powershell
    Use below to get all the open files:
    Get-SMBOpenFile | flFileId              SessionId           Path                ShareRelativePath   ClientComputerName  ClientUserName
    4415226382229       4415226380377       C:\ClusterStorag... VM4\Virtual Mach... 192.168.102.14      Contoso\Contoso-HV2$
    4415226382237       4415226380385       C:\ClusterStorag... VM4\VIRTUAL MACH... 192.168.102.14      Contoso\Contoso-HV2$
    Identify the interested path and note the 'FileId', ClientComputerName (Is the user Workstation IP)
    Use below cmdlet to identify if Locks(1) is Enabled on that path not.
    Get-SmbOpenFile -FileId 4415226383569 | Select-Object -Property *ClientComputerName    : 192.168.102.14
    ClientUserName        : Contoso\Contoso-HV2$
    ClusterNodeName       : Contoso-FS2
    ContinuouslyAvailable : True
    Encrypted             : False
    FileId                : 4415226383569
    Locks                 : 1
    Path                  : C:\ClusterStorage\Volume2\VMS\VM4.VHDX
    Once you find the correct FileId, use below command to ping and find the workstation name having the Lock,
    ping -a <IP address>
    There are few more cmdlets that you might be interested in.
    Get-SMBConnection | fl
    Get-SMBSession | fl
    References:
    Get-SmbOpenFile
    http://technet.microsoft.com/en-us/library/jj635701.aspx
    Regards,
    Satyajit
    Please“Vote As Helpful”
    if you find my contribution useful or “MarkAs Answer” if it does answer your question. That will encourage me - and others - to take time out to help you.

  • How to find out which user has the permission to execute startsap ?

    Hi All
    How do I find out which user has the permission to execute the startsap and stopsap? Do I control the permission on those script using windows standard authorization? For example: only allow certain user have the read and write permission?
    Thank you.!
    Vincent Lo

    Well to me this is really weird question..
    <b>noone un-authorized should have access to OS on your system</b>
    If this is valid you do not need to solve problems who can and who cannot start/stop SAP, because if you want to prevent some users from shutting down the SAP you have really hard job to do - there are many ways how to kill the SAP (for example killing relevant process from task manager, killing of database, messing with services etc.) - yes, this is harmful way of stopping SAP, but we are talking about attack, right? I would contact some Windows specialist to help you disable all the ways how to harm the running SAP. But still after that - there are many files that can be modified/deleted so SAP will crash after restart - you need to protect them too, etc.
    In case you take the first assumption as granted (and you really limit access to this server) you do not need to worry who can stop or start SAP - at the other hand it may be handy to be able to start/stop SAP from other users - for this you can run the stop/start script "under different user".
    But to answer the question - to me this is question just of access control (but really never tried that myself):
    <a href="http://technet2.microsoft.com/WindowsServer/en/library/c6413717-511e-42bd-bd81-82431afe4b2a1033.mspx">Permit or restrict access to a snap-in for a domain</a> (or see other related links down there on this page)
    Please award points for useful answers.
    Thanks

  • What report is run in SAP to get the DATE on which Users are locked ?

    Hello,
    What report is run in SAP to get the DATE on which Users are locked ?
    I have tried with RSUSR200 ,-- last logon ,last password change , but i did not get a option to find the date on which are Users are locked .
    Can anyone suggest what report should be executed to get the date on which Users are locked and by whom ?
    As a alternate , i  am usig SUIM to get extract this data but i am looking for a report .
    thanks & regards
    Ganesh

    Hi Ganesh,
    You can try the below link where many of the options are described:
    How i can check at what date perticular user was locked and who lock it?
    Regards,
    Nilanjan

  • How to check which user has the privilege to execute a stored procedure?

    I am using Oracle 7 and I would like to check which user has the privilege to execute a stored procedure. How can I check it? Is there any view I can query for?
    Alex Hung

    Please check DBA_SYS_PRIVS.
    SQL> select * from dba_sys_privs
    2 where grantee='HARY';
    GRANTEE PRIVILEGE ADM
    HARY EXECUTE ANY PROCEDURE NO
    ....

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • Need to know which exit to be used in me21

    Hi Guys,
    i want to know which user exit to be used in me21 so that
    if the PO has a delivery address that is outside the US; then the tax code should be EX and the tax jurisdiction code should be 7777777770.
    i had found lots of user exits in me21 but i want to know which one will fullfill my requirement.
    i am waiting for ur replys,
    regards,
    maqsood

    by seeing the short description, u need to know which exit is suitable, its just a trial and error method.
    the requirement u r telling seems to be like field exit.
    u need to take help from basis guy to register first.
    then the procedure to create field exit can be seen in below :
    http://www.sap-img.com/abap/field-exits-smod-cmod-questions-and-answers.htm
    http://www.sappoint.com/abap/userexit.pdf

  • To find which user has clicked on which link in capmaign mail

    When a campaign is executed we send a mail to the BPu2019s.now I have couple of link in that mail formu2026.I want to know which person has clicked on a what hyperlinku2026for e.g. I have two link one for sending to yahoo and other for my site addressu2026now i want to know how which person has clicked on which link...
    in the Table CRMD_IM_ML_ITEM field SUM_ACCESS increases by 1 every time a person clicks on the link.....
    is there any table taht i can use to know which kyper link the user has clicked.....
    i read about the adding response id to the mail form.....but don't how or where to use it...
    i need to genrate report later which tells which person has clicked on which link,how many number of time...

    We have a same scenario.could you please tell us the way you resolved it.
    Thanks
    Ramya

  • Another user has changed the row with primary key oracle.jbo.Key

    Oracle Jdeveloper 11.1.2.1
    ADFbc + JSF
    I have a Page ( Purchase Order Status) (which show all PO to be approved) from this page (page1) the Supervison can call Regular PO (Page2) and change whatever he needs to change. (products, quantities, discounts,warehouse...)
    then on Page2 he invoke (commit) after his changes and return to page1, when supervisor change the status to Approved on page1. I get this Error (Another user has changed the row with primary key oracle.jbo.Key[#]).
    for sure there are no another user changing this PO.
    both page are based on same Entity Object (PO) , how can I solve this Issue? thank you

    hi,
    This occur due to pessimistic locking mode for ApplicationModule ,alter to optimistic and check following sample to get knowledge about locking mode.
    http://andrejusb.blogspot.com/2010/03/optimistic-and-pessimistic-locking-in.html-Suersh

Maybe you are looking for

  • Training and Event Management - 2 Specify Attendance Types

    Hi Is it possible to assign 1 attendance types to each course type or an specific event. For example: There is a course that generates payed attendance and another course that generates non payed attendance. So to discriminate for the payroll we need

  • File type associations limit in WP8.1

    Hi everyone! I'm building a music app for WP8.1 called Teh Jukebox. I am aiming to support many music file formats. I am however running into a huge problem due to the file type limit at certification time, only allowing 20 file types to be registere

  • InDesign does not package fonts used in placed .AI files

    When we package a project for our print vendor, placed .AI files containing fonts do not get collected. I know those fonts are embedded in the .AI file when printing from InDesign, but sometimes our prep vendors need to make last minute edits to thes

  • FTP Server in FXP mode : PASV / Illegal PORT Command

    Hello, In our workflow, we transfer the media files with the FTP protocol in mode FXP (server to server), the commands are initiated by an automation system. This system work with the plateforms windows (serv-u), linux (vsftpd), osx (tnftpd) but it's

  • Ipod classic with video but no sound on music

    I can not get any of my songs to make noise, my volume is set all the way up w/o a lock. The video and music viedos plays with sound but the songs don't!!help?!?