SAP Security Interview Questions
Questions Answers Views Company eMail

What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

977

what is analysis authorization in sap bi and how to create analysis authorization in sap bi?

TCS,

1005

what is user base in sap security?

IBM,

1131

User is not there in User master record. Then how to trace the user?

IBM,

973

What does the item category specify in a purchasing requisition in SAP Materials Management?

1068

What does the item category specify in a purchasing order in SAP Materials Management?

896

What does the account assessment category specify in a purchasing document in SAP Materials Management?

920

What does the account assessment category specify in a purchasing order in SAP Materials Management?

995

What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

909

If we have UK roles in our system and we want to find the AUS australian role how you will find the same

Cap Gemini,

2 2837

How to assign any program to user?

Cap Gemini,

1050

How many profiles we can add to role and if already user has 312 profiles the, how will you provide more profile to user?

Cap Gemini,

2 2789

List of transaction codes, users are executing for last 3 months

2 3043

what is the different b/w su10 and su12

2168

difference between logon tab and group tab in su10

1 823


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

Which tables will you use for making customizing setting for security administration?

697


Can you explain internet-level security?

640


What does the account assessment category specify in a purchasing document in SAP Materials Management?

920


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

1862


How do we test security systems.

639






Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1782


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

628


What are su56 t-codes used for?

678


How to assign any program to user?

1050


Differentiate between temp role and copy role

690


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

1988


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

3978


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

647


List the various user types.

608


what is use of copy data in derived role and when we use this one ???

1314