Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

SAP Security Interview Questions
Questions Answers Views Company eMail

Plz can anybody share ur work experience on Mitigating conflicts using SoDs with GRC tools or without GRC (thankful if examples r provided)

CTS,

1 5264

What is the main purpose of Parameters, Groups & Personalization tabs in SU01 and Miniapps in PFCG? thanks in advance

HCL, Infosys,

1 30214

What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

3783

how many authorizations creates one user ?

6 10045

Scheduled a job for user master reconciliation , a user is in a validity date and roles assigned to that user are in validity date, but for reasons roles has been removed from the user master record, what could be the reason, this is not related to position based security, could some explain?

2 5493

under description ; in creating a role what should be written over there ....what does ur company follows ??

IBM,

10 9895

which role is commonly used

IBM,

3 8135

what is role designing

2 4688

what is role matrix

IBM,

2 10367

How to find the already locked users list before a particular date. Example: list of users already locked before 25.03.2010

2 8988

When validity of role is over its profile get deleted from master record but corresponding role remains as it is, Why ? Can we delete it automatically ?

Patni,

2 6584

What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?

Patni,

3 9873

Is there any transaction to see Transport Log. Means, Which data or roles have been transported from which system at what time ?

3 7003

What is Use Of SM35P and SM35 , Is there any difference between these two ?

Patni,

1 15778

What is use Of SHDB (Transaction Recorder) ?

Patni,

2 10489


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

456


what are the issues you faced with UME?

2243


What is the maximum number of authorization objects in a role?

505


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

3783


Can you explain document transfer-level security?

450






What is the use of role templates?

515


how we do CUA configuration in Quality system

1799


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

433


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

1586


Is there a table for authorizations where I can quickly see the values entered in a group of fields?

540


what is centralize FFID?

1282


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

5994


What is t code?

517


How to insert missing authorization?

502


Someone has deleted users in our system, and I am eager to find out who. Is there a table where this is logged?

523