Follow Our FB Page << >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

SAP Security Interview Questions
Questions Answers Views Company eMail

How to identify which Authorization Objects contains which fields \ activities?

IBM, ITC Infotech,

7 12201

Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one.


2 6494

in which table we can find all authorization groups


5 11188

What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code?


7 35314

How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ?


2 10336

What is difference between BW and BI Security?


2 8491

How to restrict Table access in SAP?

Infosys, Wipro,

3 16787

what is meant by "Password is not downward compatible"?


1 10450

What does below stand for? SAP ERP ECC ABAP BASIS


3 11855

What are major changes happened in GRC 10 compared to that GRC 5.3?


3 33143

what is the user table including account number and cost center in one table?


3 8265

Hi All, We have few users with SAP_ALL profile from 90 days, now i want check what are the transactions they are used till now and i didn’t activate any audit filters in SM19. In this case How can we find?

4 9750

how do we get list of users who are having mail-id’s in SU01 (Address tab)

4 11465

some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?

1 7364

How to codify for an Item in SAP? How many digits are required for an item?


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.


As a SAP security consultant what is the most challenged you faced in previous company?


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'


I create one BRF+ rule and captured in TR while releasing TR , I am getting error , WHy?


Explain document transfer-level security?


Which tables will you use for making customizing setting for security administration?


Differentiate between temp role and copy role


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules


Can you explain network topology in sap systems?


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?


What does the account assessment category specify in a purchasing document in SAP Materials Management?


What is the maximum number of profiles in a role and maximum number of object in a role?