Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help1 1894
Q)if u r using 10 firefighter ids at a time? How will the log reports goes to controller? Q)wt is ruleset? and how to update risk id in rule set? Q)wt is the procedure for Role modifications?explain with example? Q)who will done user comparision?2 6828
What is the maximum number of profiles in a role ? What is the maximum number of authorization objects in a role? What is the maximum number of authorization in an object ?5 20820
How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?2 9413
1)What does the Profile Generator do? 2)What is the main purpose of Parameters, Groups & Personalization tabs 3)in SU01? purpose of Miniapps in PFCG? 4)What happens to change documents when they are transported to the production system? 5)what are the issues you faced with UME? 6)what is the Ticketing tool that you are using in your organisation?and explain? 7)what do you know abt LSMW? 8)Difference b/w su22 and su24 ? 9)what is the landscape of GRC? 10)What is the difference between Template role & Derive role?
1) Explain me about your SAP Career? 2) Tell me your daily monitoring jobs and most of them you worked on? 3) which version of SAP are you working on? Is it a java stack or abap stack? 4) Tell me about derived role? 5) what is the main difference between single role and a derived role 6) Does s_tabu_dis org level values in a master role gets reflected in the child role?? 7) Tell me the steps to configure CUA? 8) Is RAR a java stack or Abap Stack? 9) What is the report which states the critical T-codes? and also What is the T-code? 10) What is the T-code to get into RAR from R/3? 11) Explain about SPM?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'1236
we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem5 9256
How to control user only can schedule immediate background job but cannot schedule period background job?
What is the use of RSECADMIN ?1 15921
(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?
1.WHAT IS DIFFERENCE B/W OWNER,CONTROLER AND ADMINISTRATOR IN FF? 2.WHAT IS THE DIFFERENCE B/W THESE PERSONS ROLES? 3.WHAT IS THE ONLINE AND OFFLINE RISKS?5 11249
what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red.2 8559
What does the account assessment category specify in a purchasing document in SAP Materials Management?
How to find ECC system, GRC system and BI system ?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
How do we test security systems.
what is sod in sap security?
How can sap security be improved?
How to codify for an Item in SAP? How many digits are required for an item?
What is Sap security t-codes?
Can you explain transport system-level security?
User is not there in User master record. Then how to trace the user?
You want to remove a developer's and developer keys from a system. How would you do that?
Which transaction should not be given to BASIS and DEV team in Production?
Explain secure store and forward?
When would you update a sap table directly? What precautions would you taje?
could anyone tell me how we can copy the mass roles from sap_all profiles???????