SAP Security Interview Questions
Questions Answers Views Company eMail

How I can reset the DDIC user's password? I have changed it from the delivered default?

2 5640

how do we create firefigter Id in VIRSAs VRAT

3 7615

what are the common idoc issues in a cua environment.how do you solve?

iGate,

1 4936

what are the issues you faced with UME?

iGate,

1158

what is the procedure to delete a role?

IBM, Cap Gemini, iGate,

5 15410

a user is assigned with tcode SA38.how to restrict him to execute only a few reports,say rsusr003.

iGate,

4 13861

This is in continuataion to the previous question. a user is assigned with tcode SA38.how to restrict him to execute only a few reports,say rsusr003.If you're going to modify the role(having sa38) assigned to the user,that will affect other users also because that role might be assigned to multiple users.I don' want that to happen.so what is the solution?

iGate,

5 5398

what is the alternate tcode for su01?

iGate,

4 13992

I want to reset the passwords of 100 users.how do you do it?

HP, iGate,

7 14201

I have to create 1000 users. how do you do it?

iGate,

13 12769

what all are the numbers of user types in system measurement?

iGate,

1 1952

how do you go about system meaurement?

iGate,

1 2780

what is the procedure for deleting a role?

iGate, Satyam,

6 7801

in my production system there are some 20 roles created in the production system itself without following the standard procedure of creating in dev testing it qas and then moving it to prd.so how do you find out all the roles created in prd system?

iGate,

5 5940

how to add abap role to portal users?

iGate,

2 7036


Post New SAP Security Questions


Un-Answered Questions { SAP Security }

how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help

967


How we Educated client personnel in R/3 Security and general Basis knowledge

577


How to Maintenance of User Master Records, Profiles, Authorizations

596


hat is transaction varient?

611


Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help

709


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

804


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

1901


DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE

709


why do create Firefighters and ffids service type user?

154


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

2431


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

584


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

596


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

493


how we can see FFID if firefighter not able to see FFids ?

146


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

1107