Follow Our FB Page << >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

SAP Security Interview Questions
Questions Answers Views Company eMail

Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)


1 5264

What is the main purpose of Parameters, Groups & Personalization tabs in SU01 and Miniapps in PFCG? thanks in advance

HCL, Infosys,

1 30214

What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.


how many authorizations creates one user ?

6 10045

Scheduled a job for user master reconciliation , a user is in a validity date and roles assigned to that user are in validity date, but for reasons roles has been removed from the user master record, what could be the reason, this is not related to position based security, could some explain?

2 5493

under description ; in creating a role what should be written over there ....what does ur company follows ??


10 9895

which role is commonly used


3 8135

what is role designing

2 4688

what is role matrix


2 10367

How to find the already locked users list before a particular date. Example: list of users already locked before 25.03.2010

2 8988

When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?


2 6584

What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?


3 9873

Is there any transaction to see Transport Log. Means, Which data or roles have been transported from which system at what time ?

3 7003

What is Use Of SM35P and SM35 , Is there any difference between these two ?


1 15778

What is use Of SHDB (Transaction Recorder) ?


2 10489

Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?


what are the issues you faced with UME?


What is the maximum number of authorization objects in a role?


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.


Can you explain document transfer-level security?


What is the use of role templates?


how we do CUA configuration in Quality system


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'


Is there a table for authorizations where I can quickly see the values entered in a group of fields?


what is centralize FFID?


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS


What is t code?


How to insert missing authorization?


Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?