SAP Security Interview Questions
Questions Answers Views Company eMail

How I can reset the DDIC user's password? I have changed it from the delivered default?

2 5810

how do we create firefigter Id in VIRSAs VRAT

3 8099

what are the common idoc issues in a cua do you solve?


1 5291

what are the issues you faced with UME?



what is the procedure to delete a role?

IBM, Cap Gemini, iGate,

5 17103

a user is assigned with tcode to restrict him to execute only a few reports,say rsusr003.


4 14990

This is in continuataion to the previous question. a user is assigned with tcode to restrict him to execute only a few reports,say rsusr003.If you're going to modify the role(having sa38) assigned to the user,that will affect other users also because that role might be assigned to multiple users.I don' want that to what is the solution?


5 5679

what is the alternate tcode for su01?


4 15278

I want to reset the passwords of 100 do you do it?

HP, iGate,

7 15687

I have to create 1000 users. how do you do it?


13 13496

what all are the numbers of user types in system measurement?


1 2143

how do you go about system meaurement?


1 2925

what is the procedure for deleting a role?

iGate, Satyam,

6 8187

in my production system there are some 20 roles created in the production system itself without following the standard procedure of creating in dev testing it qas and then moving it to how do you find out all the roles created in prd system?


5 6222

how to add abap role to portal users?


2 7429

Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)


could anyone tell me how we can copy the mass roles from sap_all profiles???????


what is centralize FFID?


what is the difference in grc background jobs


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.


what is the critical issue u are faced in your previous experience


How we Provided Security design, configuration, and support for SAP Enterprise Portals


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.


What are the upgrades happened in GRC 5.3 from GRC 5.2?


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.


when performing client copies what steps you need to take from CUA point of view?