zoukankan      html  css  js  c++  java
  • SAP所有用户被锁定,处理方法

    所有?是否包括超级用户SAP*?

    如果sap*未锁定,可以用sap*登陆解锁,用户数少可以手工在su01里解,用户数多的话,可以用catt or abap程序的方式批量改,table字段为usr02-UFLAG.

    如果sap*也锁定了,那就得黑一把了:
    首先,确认参数文件login/no_automatic_user_sapstar的值为0;
    然后,直接登陆到数据库中,删除USR02表中,相应client的SAP*用户,不要删错罗;)
    最后嘛,再用SAP*登陆该client,使用口令PASS,进去再做上面说的操作。
    -----------------------

    所有用户都被锁了,当然进不了系统,也用不了rz10了,去目录底下看
    /usr/sap/SID/SYS/profile/(instance profile)
    找login/no_automatic_user_sapstar这个参数,如果没找到说明sap*可以用来登陆,如果值是1,说明sap*被deactive了,要改成0.
    然后sqlpus去删除sap*:
    delete from sapr3.usr02 where mandt='<client>' and bname='SAP*';
                commit;
    最后重启SAP instance 来activated新的profile.
    用sap*登陆后可用su10批量来解其他用户.

    ------------------------------------------------------

    how to reset DDIC and SAP* password 如何解除DDIC 和SAP* 用户全被锁定

    I'll give the awnser from my issue practise as below:
    1, logon the operate system as <sid>adm. for example:  logon the server by user slmadm and password. slm is the slm's sid, slmadm is the admin for slm.
    if slm was installed on the single PC, this step can be ignored. if slm and dev or ide or prd were installed on the one server together, this step is important.
    2, cmd - > sqlplus /nolog
    3, sql > connect /as sysdba
    4, sql > delete from sapsr3.usr02 where bname='SAP*' AND mandt='001';
    5, sql > commit;
    6, sql > exit
    note: the key step is 4,  001 is the wanted client, you can change it. sapsr3.usr02   is used be. you can see it use : "select owner,table_name from dba_tables where table_name='USR02'; ".
    finally, ";" cannot be ommitted.
    7, then you can logon 001 with sap* (password is pass). needn't restart the instance. and you can change or unlock any other users by sap*.
    8, enjoy it!
  • 相关阅读:
    linux mono环境
    【百度杯】ctf夺旗大战,16万元奖励池等你拿
    【渗透技术】渗透测试技术分析_TomCat
    成功率“99%”!截止目前史上最强大电信诈骗术
    【sql注入】浅谈sql注入中的Post注入
    通过Weeman+Ettercap配合拿下路由器管理权限
    【sql注入教程】mysql注入直接getshell
    【云盘资料】Sql注入从菜鸟到高手系列教程
    【安全开发】浅谈JSP安全开发之XSS
    Python黑帽编程2.1 Python编程哲学
  • 原文地址:https://www.cnblogs.com/elegantok/p/1403801.html
Copyright © 2011-2022 走看看