SAP Security Interview Questions
Questions Answers Views Company eMail

In SU53 screenshot , there are missing authorization. How you come to know that these are the relevant Roles in which we have to add these objects? Decision not SUIM

IBM,

1 11358

Attributes in SE01?

IBM,

2111

Users are lockdown from past 3 -4 months. Which table is used to know that which users are lockdown?

IBM,

3 9777

Difference between Standard and Manual objects?

IBM,

2 10241

Difference between Change Mode and Expert Mode in PFCG?

IBM, L&T,

1 34323

Difference between S_tcode and Menu tab transactions?

IBM,

5 18113

Red, Yellow, Green in PFCG significance? Can we generate red Roles in PFCG and assign it to Users?

IBM,

3 16500

Difference between short and Long Description in PFCG?

IBM,

2 9574

Which request is this Which we create for transportation?

IBM,

2 5982

Could you please let me know the exact step by step process for the following Questions. 1.How to get the E-Mail address for 100 users at a time. 2.While Creating BW roles what are the Authorization Objects we will use. 3.While Creating Single role what will be happened in the functional side, when entered the Template role in the derived role tab. 4.when we changed the password for more users(for example:100 users) where the password will be stored or from where you can Re-Collect the password and how will you Communicate the password to all users at a time. 5.What is Virsa? Once you entered in to the screen what it will perform. 6.What is the use of SU24 & SM24. 7.While Creating BW roles what are the Authorization Objects we will use. 8.While Creating Single role what will be happened in the functional side, when you entered the Template role in the derived role tab. 9.What is Dialog users, Batch users and Communicate users. What is the use with Communicate user. 10.Can we add one Composite role in to another Composite role at any urgent user requests or in normal user requests. 11.In Transport what type of Request we will use.Why don't we use Workbench request in transport. 12.When we added Authorization Object in Template role, at the same time what will be happen in Derived role. 13.How to Check Profile parameter. And how to find whether any transport has ended with error and where we can check. 14.How to Extract users list like who didn't login since 3 months. And In 90 Days user Locking in which table we will use. 15.What is OSS Connection and System Opening and why we have to open these. 16.What will have in one single role and how many prifiles will be in one sap cua system. 17.What is the difference between Template role & Derive role.

Infosys,

3 14912

1. what is the difference b/w change authorization mode and expert mode. 2.when we do the user comparison in pfcg what is the difference in complete comparison and expert mode comparison. 3. what are the critical auth objects in security point of you , 4.when we do the transportation of composite role what will happened . 5.while doing the kernel upgrade we download the executable s one by one are all together. 6. while applying the patches what is the importance of test import why we do test import

IBM,

2 21387

Could any one tell me "What is critical authorizations in sap security"?

Accenture,

6 12685

can any tell me if a t_code is assigned to 5000 users then how would you find out who never uses this t_code?

CTS,

3 10216

how can u assign firefighter ids from one firefighter admin to another firefighter admin if current admin leaves from organization without told to any body?

CTS, Satyam,

3 11166

HI FRIENDS, Can anybody tell me which is best institute in Hyderabad or bangalore for SAP GRC COURSE.How much duration and cost? Regards, sandy...@

6 10023


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How to update risk id in rule set?

661


Which tables will you use for making customizing setting for security administration?

699


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

889


Can wildcards be used in authorizations?

697


Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.

666






You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

726


What does the item category specify in a purchasing order in SAP Materials Management?

898


What is audit information system?

709


Explain document transfer-level security?

664


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1784


Can you explain internet-level security?

641


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

696


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

1784


Why is it important to delete sap-new profile? What steps will you take to do this?

666


How to do Role Design, Testing and Implementation

2032