SAP Security Interview Questions
Questions Answers Views Company eMail

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

IBM,

1780

How we Provided Security design, configuration, and support for SAP Enterprise Portals

IBM,

1763

how to do Assigning authorization groups for table restrictions and program restrictions.

IBM,

1 5443

how to do Reporting and Analysis authorizations

IBM,

1886

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

IBM,

1863

how to we Assigning Portal groups for Business users in BI

IBM,

1 2772

what is the difference between BI AND BW security

IBM,

2 15359

How we do Scheduled jobs in background to cleanup spool request, dumps

IBM,

2 7161

how we Set up profile parameters and security Audit log activation

IBM,

3 7491

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1690

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM, SAP Labs,

1836

how we Work on VIRSA TOOL on Compliance calibrator, Fire Fighter

IBM,

2 7130

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

1 6347

How we Schedul and administering Background jobs.

IBM,

1 2709

How we Schedul and administering Background jobs.

IBM,

2 5916


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Explain protecting public keys?

663


Can you explain internet-level security?

639


You want to create and maintain user master record. What authorization would you need?

712


What is sap cryptographic library?

625


HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.

1554






How do we test security systems.

639


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

686


What is the use of su56?

680


How can I do a mass delete of the roles without deleting the new roles?

839


Explain transport system-level security?

635


How to run the daily background job s for virsa violations ? thabks in advance

3150


how to do Reporting and Analysis authorizations

1886


What happens to change documents when they are transported to the production system?

1159


How to update risk id in rule set?

657


What appears as the last sentence in sap note 587410?

649