What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
Answer Posted / siva ramaiah b v
1.Identify the users and their functionalities.
2.define and use authorization objects.
3.Roles will be designed as per GRC i.e single roles and composite role.
4.All roles should be controlled by objects ie. it should not be wild chars ( Notification Type : t1, t2..)
5.All roles will controlled with business functions i.e (If not required controlled functions like Release, create, close, TECO, Change etc.)
Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
Can you explain sap system transactions?
Can you explain internet-level security?
What are the uses of an authorization group?
what is user base in sap security?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Differentiate between temp role and copy role
When would you update a sap table directly?
What is a composite role?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
What are the upgrades happened in GRC 5.3 from GRC 5.2?
What happens to change documents when they are transported to the production system?
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
What is the use of Personalization tab in SU01?
What is the maximum number of profiles in a role and maximum number of object in a role?
what is the process to find that one consultant had removed a table from sap tables