SAP Security Interview Questions
Questions Answers Views Company eMail

your functional team has asked you to provide the seurity for a tcode.how do you go about it?

iGate,

2 7675

when performing client copies what steps you need to take from CUA point of view?

iGate,

2110

what is the advantage of cua from a layman/manager point of view?

IBM, iGate,

3 10976

How to create secatt script in sap step by step

1 13819

I want to see list of roles assigned to 10 different users.how do you do it?

Cap Gemini, IBM,

6 28475

one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?

Cap Gemini,

3 13251

In which way we can assiagn single role to many users(more than 5000 usres).

3 9877

How many maximum profiles we can assign to one user?

IBM,

9 22625

Can we assign generated profiles to users directly?

9 20853

How can we update the unique E-mail IDs for 1000 users at a time?

Satyam,

3 9827

What do you mean by User Buffer? How it works with the user's Authorizations?

Satyam,

6 29770

What is the T.Code SQVI? What is the main usage of this SQVI?

Satyam,

3 13599

How can we maintain Organizational values? How can we create Organizational values? What is the purpose of these Org. values?

Satyam,

2 15644

What is the correct procedure for Mass Generation of Roles?

Satyam,

3 19687

Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.

IBM,

2 10286


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is a composite role?

799


What are se10 t-codes used for?

689


What is the use of su56?

685


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

1621


You want to create and maintain user master record. What authorization would you need?

714






Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3035


How to create users?

716


Can you explain transport system-level security?

588


What is sap’s grc?

711


As a SAP security consultant what is the most challenged you faced in previous company?

659


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2352


What is t code?

678


Can you explain protecting public keys?

587


What does user compare do?

679


What does the pfcg_time_dependency clean up?

795