Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

SAP Security Interview Questions
Questions Answers Views Company eMail

What is Business Process? Explain about the Business Process Procure to Pay?

Accenture,

1 6640

why do you think keylabs is best inistitute in bangalore for sap security, I am looking for sap security training with GRC, do u suggest keylabs or any other inistitute

5 10218

how to secure the customizing Tcodes in sap

1 7776

. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?

1 6126

1 .what are the authorization switches in security

IBM,

1 7732

use of T-code SE63

IBM, Satyam,

2 12230

why fire fighter id is using in the production system ?

IBM,

3 11983

how to modify a mass users validity,address,email...at a time ?

IBM,

3 18455

why we are using the landscape in sap r/3 ?

HP,

4 11897

what is the difference between su25 & su24 , when we can make the authorization checks in su25 then what is the use of su24

2 20442

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

Xenon,

1 3874

I have deleted single role from composite role now i want to find out the changes in composite role without using SUIM. Is there any other possibilitie to get?

3 15988

what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ?

1 8890

What are the Critical Tcodes and Authorization Objects in R/3.

3 20687

Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

IBM,

2340


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3251


Can you explain network topology in sap systems?

1187


What are se09 t-codes used for?

1394


Explain sap system transactions?

1226


What is t code?

1174


How we Educated client personnel in R/3 Security and general Basis knowledge

2334


Differentiate between saml token profile and a sap logon ticket

1434


how you can delete multiple roles from qa, dev and production system?

1347


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1248


What are pfud t-codes used for?

1337


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4773


Can wildcards be used in authorizations?

1272


What is use of derived roles?

1307


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1736


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2767