Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
1 3465Q)if u r using 10 firefighter ids at a time? How will the log reports goes to controller? Q)wt is ruleset? and how to update risk id in rule set? Q)wt is the procedure for Role modifications?explain with example? Q)who will done user comparision?
2 10416What is the maximum number of profiles in a role ? What is the maximum number of authorization objects in a role? What is the maximum number of authorization in an object ?
5 28756How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?
2 135931)What does the Profile Generator do? 2)What is the main purpose of Parameters, Groups & Personalization tabs 3)in SU01? purpose of Miniapps in PFCG? 4)What happens to change documents when they are transported to the production system? 5)what are the issues you faced with UME? 6)what is the Ticketing tool that you are using in your organisation?and explain? 7)what do you know abt LSMW? 8)Difference b/w su22 and su24 ? 9)what is the landscape of GRC? 10)What is the difference between Template role & Derive role?
TCS,
4 150491) Explain me about your SAP Career? 2) Tell me your daily monitoring jobs and most of them you worked on? 3) which version of SAP are you working on? Is it a java stack or abap stack? 4) Tell me about derived role? 5) what is the main difference between single role and a derived role 6) Does s_tabu_dis org level values in a master role gets reflected in the child role?? 7) Tell me the steps to configure CUA? 8) Is RAR a java stack or Abap Stack? 9) What is the report which states the critical T-codes? and also What is the T-code? 10) What is the T-code to get into RAR from R/3? 11) Explain about SPM?
TCS,
2 15550Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
2144we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem
8 16492How to control user only can schedule immediate background job but cannot schedule period background job?
Sony,
2 8251(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?
HCL,
6 330391.WHAT IS DIFFERENCE B/W OWNER,CONTROLER AND ADMINISTRATOR IN FF? 2.WHAT IS THE DIFFERENCE B/W THESE PERSONS ROLES? 3.WHAT IS THE ONLINE AND OFFLINE RISKS?
5 17857what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red.
2 11222Post New SAP Security Questions
What is the difference between the table buffer and the user buffer?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
What authorization are required to create and maintain user master records?
How we schedule and administering background jobs?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
what is the main difference between the derived role and a single role?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What are su25 t-codes used for?
List the various user types.
what is the use of defaults tab in start menu
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What are the different types of sap security tables?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
How we Educated client personnel in R/3 Security and general Basis knowledge