SAP Security Interview Questions
Questions Answers Views Company eMail

What is Business Process? Explain about the Business Process Procure to Pay?

Accenture,

1 5729

why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute

5 8137

how to secure the customizing Tcodes in sap

1 6646

. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

1 5249

1 .what are the authorization switches in security

IBM,

1 6739

use of T-code SE63

IBM, Satyam,

2 10942

why fire fighter id is using in the production system ?

IBM,

3 10266

how to modify a mass users validity,address,email...at a time ?

IBM,

3 16346

why we are using the landscape in sap r/3 ?

HP,

4 9922

what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24

2 18786

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

Xenon,

1 2992

I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?

3 14262

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

1 7840

What are the Critical Tcodes and Authorization Objects in R/3.

3 18733

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

IBM,

1784


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is use of derived roles?

750


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1694


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

1784


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

649


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

1867






What are the uses of an authorization group?

702


how to do Reporting and Analysis authorizations

1886


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

1532


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

977


what is the different b/w su10 and su12

2168


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

912


How we Provided Security design, configuration, and support for SAP Enterprise Portals

1765


how we can see FFID if firefighter not able to see FFids ?

1469


What is a composite role?

799


Explain document transfer-level security?

664