ALLInterview.com :: Home Page      
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Testimonials Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
   
 
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
 
Suggest New Category 
 


 

Question Asked @ Answers Views     Select
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  857
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  1644
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  1159
what is the user table including account number and cost center in one table? patni   2  1336
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  3480
What does below stand for? SAP ERP ECC ABAP BASIS infosys   3  1257
what is meant by "Password is not downward compatible"? colgate   1  1325
How to restrict Table access in SAP? wipro   2  1691
What is difference between BW and BI Security? accenture   2  1295
How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ? accenture   1  1860
What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code? deloitte   6  2213
in which table we can find all authorization groups cognizent   4  1557
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one. cts   2  962
How to identify which Authorization Objects contains which fields \ activities? ibm   6  1555
I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?    1  1002
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views   Select
 
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this 529
How to Maintenance of User Master Records, Profiles, Authorizations 180
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint. 548
How to do Role Design, Testing and Implementation 270
Through CTS how we come to know the Role? 204
how we Created over 120 customized end user roles and menus. 166
Please also send me details about CRM 5 and CRM 7 security issues and scenarios. 618
What does PRGN_STAT & TCODE_MOD table consist of? 820
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan. 383
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW 245
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help 347
How we Provided Security design, configuration, and support for SAP Enterprise Portals 163
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600. 273
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security? 520
Tables so far used? 127
E-Mail New Answers        Answer Selected Questions