ALLInterview.com :: Home Page      
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   Errors
   Refer this Site  Refer This Site to Your Friends  Site Map  Contact Us      
   
 
 Categories >> Software >> ERP CRM >> SAP >> SAP Security
 
Suggest New Category 
 


 

Question Asked @ Answers Views     Select
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?    1  820
how do we get list of users who are having mail-id’s in SU01 (Address tab)    4  1599
Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?    3  1119
what is the user table including account number and cost center in one table? patni   2  1300
What are major changes happened in GRC 10 compared to that GRC 5.3? sony   3  3429
What does below stand for? SAP ERP ECC ABAP BASIS infosys   3  1210
what is meant by "Password is not downward compatible"? colgate   1  1285
How to restrict Table access in SAP? wipro   2  1648
What is difference between BW and BI Security? accenture   2  1260
How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ? accenture   1  1821
What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code? deloitte   6  2144
in which table we can find all authorization groups cognizent   4  1520
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one. cts   2  927
How to identify which Authorization Objects contains which fields \ activities? ibm   6  1503
I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?    1  971
E-Mail New Answers        Answer Selected Questions        Post New sap-security Questions
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21   ... 23    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views   Select
 
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE 287
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS 151
how to do Reporting and Analysis authorizations 210
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint. 532
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this 522
Attributes in SE01? 347
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600. 264
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 405
what are the issues you faced with UME? 408
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security? 497
How see hierarchies in BI security 391
hOW many users limit in su10 2992
whats the meaning of relocation in transport request ? 568
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 288
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments. 166
E-Mail New Answers        Answer Selected Questions