How to approach as a security consultant when a custom t code is created?

Answer Posted / neelima

Whenever a new custom TCode is created, it has been communicated to security so that auth + field values can be maintained in SU24.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how a t code works

1980


Explain x-glueb and its use in sap security.

814


How to create users?

735


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

607


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1863






Which transaction code is used to display the user buffer?

682


Can you explain sap system transactions?

695


what is use of copy data in derived role and when we use this one ???

1336


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2225


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1785


Differentiate between temp role and copy role

709


Differentiate between saml token profile and a sap logon ticket

861


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2239


what is your ticketing tool? can we give some details about how we are getting tickets

1161


Differentiate between usobx_c and usobt_c

630