What is the difference between ECC security and RAR security
when GRC (RAR<SPM<CUP) is used, when similar functionality can
be performed SAP R3 level(ECC)?
Answers were Sorted based on User's Feedback
Answer / itsgaurav151
The things ECC security and RAR security are different. ECC
is a system whereas RAR is a tool. ECC security involves
securitg data, t-code access, report access and maintaining
the suthorizations. RAR(Risk analysis and Remediation) is a
tool that is used for analysis of risk analysis and its
remeduation as name suggests. Rhis tool determines all
potential risks that arises if a t-code/object/role/auth is
assigned to a user. Also this tool helps to remediate that
risk using mitigation technique.
Is This Answer Correct ? | 6 Yes | 1 No |
Answer / rahman shaik
Simply we can say one thing like In Ecc system you cant find any risk while assigning the roles but in RAR tool it will check the RISK of that particular assignment and if risk is their then we can mitigate and simulate to that risk
I mean its purely for SOD(segregation of duties)
Is This Answer Correct ? | 4 Yes | 0 No |
how many composite roles can be assigned to a user ?
what are various user types
Can you explain protecting public keys?
Could you please let me know the exact step by step process for the following Questions. 1.How to get the E-Mail address for 100 users at a time. 2.While Creating BW roles what are the Authorization Objects we will use. 3.While Creating Single role what will be happened in the functional side, when entered the Template role in the derived role tab. 4.when we changed the password for more users(for example:100 users) where the password will be stored or from where you can Re-Collect the password and how will you Communicate the password to all users at a time. 5.What is Virsa? Once you entered in to the screen what it will perform. 6.What is the use of SU24 & SM24. 7.While Creating BW roles what are the Authorization Objects we will use. 8.While Creating Single role what will be happened in the functional side, when you entered the Template role in the derived role tab. 9.What is Dialog users, Batch users and Communicate users. What is the use with Communicate user. 10.Can we add one Composite role in to another Composite role at any urgent user requests or in normal user requests. 11.In Transport what type of Request we will use.Why don't we use Workbench request in transport. 12.When we added Authorization Object in Template role, at the same time what will be happen in Derived role. 13.How to Check Profile parameter. And how to find whether any transport has ended with error and where we can check. 14.How to Extract users list like who didn't login since 3 months. And In 90 Days user Locking in which table we will use. 15.What is OSS Connection and System Opening and why we have to open these. 16.What will have in one single role and how many prifiles will be in one sap cua system. 17.What is the difference between Template role & Derive role.
How many profiles we can add to role and if already user has 312 profiles the, how will you provide more profile to user?
how many authorizations creates one user ?
How will you delete the user in sap security SU01
You want to remove a developer's and developer keys from a system. How would you do that?
Pfcg proposed activities but you need only two. What would you do?
What is the use of RSECADMIN ?
User done tasks with ffid n logged off but controller not get any log reports,why?
how we Created over 120 customized end user roles and menus.