1) Explain me about your SAP Career?
2) Tell me your daily monitoring jobs and most of them you
worked on?
3) which version of SAP are you working on? Is it a java
stack or abap stack?
4) Tell me about derived role?
5) what is the main difference between single role and a
derived role
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
7) Tell me the steps to configure CUA?
8) Is RAR a java stack or Abap Stack?
9) What is the report which states the critical T-codes? and
also What is the T-code?
10) What is the T-code to get into RAR from R/3?
11) Explain about SPM?
Answers were Sorted based on User's Feedback
Answer / sudha
4) Tell me about derived role?
Ans:Derived roles..To restrict the user access based on
organizational level values.
Derived role will be inherited by master role and inherit
all the properties except org level values.
5) what is the main difference between single role and a
derived role?
Ans:Main difference--we can add/delete the tcodes for the
single roles but we cann't do it for the derived roles.
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
Ans:If we do the adjusted derived role in the master role
while updating the values in the master role thn values will
be reflected in the child roles.
10) What is the T-code to get into RAR from R/3?
Ans:/virsar/ZVRAT
11: Explain about SPM?
Ans:SPM can be used to maintain and monitor the super user
access in an SAP system. This enables the super-users to
perform emergency activities and critical transactions
within a completely auditable environment. The logs of the
SPM user IDs helps auditors in easily tracing the critical
transactions that have been performed by the Business users
Is This Answer Correct ? | 11 Yes | 1 No |
Ans 1) Elaborate about your complete SAP experience
and yes be true with them.
Ans 2) As a part of my daily job being a SAP Security
consultant i have to take care of tickets monitoring and
assigning them within the team. I have to take care of
critical incidents and emphasize themon high priority for
their faster resolution. I have to troubeshoot different
authorization issues that come across in daily work with
the users.
Ans 3) You have to check this with your systems.
Ans 8) RAR is Java stack. It was ABAP when it was called as
Complance Calibrator.
Ans 9) RSUSR005
Is This Answer Correct ? | 5 Yes | 0 No |
where v creat auth group
Tell me about the license types and what kind of users need to be assigned to these license types
What are identical users in CUA?
SAP GRC 10.0
What are pfcg t-codes used for?
How to approach as a security consultant when a custom t code is created?
Hello sap guru, does anyone pls know where sap written the VIRSA FIREFIGHTER LOGS ? I MEAN TO SAY WHEN USER GET OUT FORM THE SYSTEM AFTER USING FF ID A TEXT FILE SENT TO CONTROLLER AND I NEED TO KNOW THOSE LOGS THAT WHERE SAP WRITTEN LOGS IN THE SYSTEM...........ASAP PLEASE
how we can see FFID if firefighter not able to see FFids ?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
What is the difference between c (check) and u (unmaintained)?
Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
How we schedule and administering background jobs?