SAP Security Interview Questions
Questions Answers Views Company eMail

your functional team has asked you to provide the seurity for a tcode.how do you go about it?

iGate,

2 7676

when performing client copies what steps you need to take from CUA point of view?

iGate,

2112

what is the advantage of cua from a layman/manager point of view?

IBM, iGate,

3 10986

How to create secatt script in sap step by step

1 13823

I want to see list of roles assigned to 10 different users.how do you do it?

Cap Gemini, IBM,

6 28479

one tcode,say sa38, is assigned to 10 diffrent users through a same role.I want to restrict one of those 10 users to execute only a few reports in sa38 but not all reports.what are the possible ways of getting it done?

Cap Gemini,

3 13260

In which way we can assiagn single role to many users(more than 5000 usres).

3 9883

How many maximum profiles we can assign to one user?

IBM,

9 22636

Can we assign generated profiles to users directly?

9 20864

How can we update the unique E-mail IDs for 1000 users at a time?

Satyam,

3 9832

What do you mean by User Buffer? How it works with the user's Authorizations?

Satyam,

6 29778

What is the T.Code SQVI? What is the main usage of this SQVI?

Satyam,

3 13603

How can we maintain Organizational values? How can we create Organizational values? What is the purpose of these Org. values?

Satyam,

2 15650

What is the correct procedure for Mass Generation of Roles?

Satyam,

3 19694

Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.

IBM,

2 10289


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

explain the personalization tab within a role?

842


The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..

2000


Explain protecting public keys?

665


what is centralize FFID?

1524


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3229






By which parameter number of entries are controlled in the user buffer?

901


Explain document transfer-level security?

664


How to find out who has deleted users in the system?

691


What does the item category specify in a purchasing order in SAP Materials Management?

902


As a SAP security consultant what is the most challenged you faced in previous company?

659


what is the different b/w su10 and su12

2171


What does the account assessment category specify in a purchasing document in SAP Materials Management?

923


What is the difference between the table buffer and the user buffer?

721


What are su53 t-codes used for?

821


what is the critical issue u are faced in your previous experience

1417