SAP Security Interview Questions
Questions Answers Views Company eMail

How to insert missing authorization?

681

What is the t-code used for locking the transaction from execution?

1 1417

what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

663

What profile versions?

806

How to create users?

736

Which t-code can be used to delete old security audit logs?

905

What is a derived role?

1 1357

what is the difference between usobt_c and usobx_c?

777

How can I do a mass delete of the roles without deleting the new roles?

855

How many transactions codes can be assigned to a role?

2 1628

How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

906

How we schedule and administering background jobs?

667

Can wildcards be used in authorizations?

709

What does the pfcg_time_dependency clean up?

814

What does the profile generator do?

700


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

what is the use of defaults tab in start menu

1395


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

607


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1882


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

843


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3756






What is sap cryptographic library?

647


what is the different b/w su10 and su12

2188


What is sap’s grc?

733


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

643


Explain snc in sap security?

711


what is user buffer?

739


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

680


Can you explain network topology in sap systems?

635


What authorization are required to create and maintain user master records?

677


What are se10 t-codes used for?

707