How to approach as a security consultant when a custom t code is created?
Answer Posted / neelima
Whenever a new custom TCode is created, it has been communicated to security so that auth + field values can be maintained in SU24.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
how a t code works
Explain x-glueb and its use in sap security.
How to create users?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Which transaction code is used to display the user buffer?
Can you explain sap system transactions?
what is use of copy data in derived role and when we use this one ???
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Differentiate between temp role and copy role
Differentiate between saml token profile and a sap logon ticket
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
what is your ticketing tool? can we give some details about how we are getting tickets
Differentiate between usobx_c and usobt_c