SAP Security Interview Questions
Questions Answers Views Company eMail

How to find the roles which are not contains profiles

Cap Gemini, United Breweries UB,

1 12630

How to clean the data (users, roles, etc..) from GRC 5.3?

TCS,

1 8369

why we should not check " Generate automatically " option in SUPC?

HP,

2 10834

Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2103

different b/w Direct assigment and indirect role in bi security whn will go direct assignment

CTS,

2 11082

1 How many tickets usually get per day/month in support ? 2 what is the major ticket in your experience ? 3 what is the tool you are using in your company? 4 in situation we will use Derive roles in support project? 5 One User asked me the TCODE access in support project,he got approvals from all,so shal i create new role or can i add that TCODE in his roles? 6 what is ROLE OWNER? 7 What are the daily activities in your Project ?

ADI, AXA, TCS,

2 9461

In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?

HP,

4 14198

What is diffrence to add tcode in Menu tab(PFCG)and in S_TCODE object?

IBM,

6 22143

How to get the list of tcodes having by all users(EX-20 users)at a time?(through SUIM or TABLE) [we can get single user through SUIM->TRANSACTIONS- >EXECUTABLE USER....but same thing i want for multiple users at a time)

IBM, L&T,

6 26443

Can you please let me know the GRC 10 landscape, is it 2 system landscape like GRC 5.3 or 3 system landscape. As GRC 10 is ABAP Stack

TCS,

4 17874

1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?

ABB, CSC,

4593

What transactions can be assigned for all the users ?

Accenture,

6 16460

how to view the su53 screen for other users?

Accenture,

3 49892

I have uploaded one role(its is derived role) from quality system to development system.After that, i have generated role and tried to move production. while transporting role i am getting below error ' ROLE TYPE IS UNDETERMINED ' can any body please provide the solution?

British Council, CGI,

2 11655

Hi we are working on the one company but location are different one location we are restrict the user pass word length 8 characters another location pass word length 10 characters but client is same and also we are maintaining the one app server. Could please help on this

4 8789


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

2711


what is the main difference between the derived role and a single role?

664


What are pfud t-codes used for?

674


What is Sap security t-codes?

703


what is user buffer?

703






What is the difference between usobx_c and usobt_c?

621


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

1736


Explain x-glueb and its use in sap security.

754


Can you explain sap system transactions?

673


could anyone tell me how we can copy the mass roles from sap_all profiles???????

1584


What are su25 t-codes used for?

680


How to update risk id in rule set?

647


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

877


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3733


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3019