Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
1 3435Q)if u r using 10 firefighter ids at a time? How will the log reports goes to controller? Q)wt is ruleset? and how to update risk id in rule set? Q)wt is the procedure for Role modifications?explain with example? Q)who will done user comparision?
2 10382What is the maximum number of profiles in a role ? What is the maximum number of authorization objects in a role? What is the maximum number of authorization in an object ?
5 28702How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?
2 135711)What does the Profile Generator do? 2)What is the main purpose of Parameters, Groups & Personalization tabs 3)in SU01? purpose of Miniapps in PFCG? 4)What happens to change documents when they are transported to the production system? 5)what are the issues you faced with UME? 6)what is the Ticketing tool that you are using in your organisation?and explain? 7)what do you know abt LSMW? 8)Difference b/w su22 and su24 ? 9)what is the landscape of GRC? 10)What is the difference between Template role & Derive role?
TCS,
4 150121) Explain me about your SAP Career? 2) Tell me your daily monitoring jobs and most of them you worked on? 3) which version of SAP are you working on? Is it a java stack or abap stack? 4) Tell me about derived role? 5) what is the main difference between single role and a derived role 6) Does s_tabu_dis org level values in a master role gets reflected in the child role?? 7) Tell me the steps to configure CUA? 8) Is RAR a java stack or Abap Stack? 9) What is the report which states the critical T-codes? and also What is the T-code? 10) What is the T-code to get into RAR from R/3? 11) Explain about SPM?
TCS,
2 15496Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
2127we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem
8 16415How to control user only can schedule immediate background job but cannot schedule period background job?
Sony,
2 8224(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?
HCL,
6 329741.WHAT IS DIFFERENCE B/W OWNER,CONTROLER AND ADMINISTRATOR IN FF? 2.WHAT IS THE DIFFERENCE B/W THESE PERSONS ROLES? 3.WHAT IS THE ONLINE AND OFFLINE RISKS?
5 17813what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red.
2 11202Post New SAP Security Questions
When would you update a sap table directly? What precautions would you taje?
What are su22 t-codes used for?
Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Tell me about derived role?
What are su25 t-codes used for?
Can you explain network topology in sap systems?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What is sap’s grc?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
User is not there in User master record. Then how to trace the user?
How do we test security systems.
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?