Un-Answered Questions { SAP Security }

Differentiate between derived role and composite role

656


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

626


You want to remove a developer's and developer keys from a system. How would you do that?

628


Why is it important to delete sap-new profile? What steps will you take to do this?

674


What are se09 t-codes used for?

696


Explain x-glueb and its use in sap security.

784


Differentiate between temp role and copy role

694


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

633


What are su56 t-codes used for?

686


Differentiate between saml token profile and a sap logon ticket

850


What are su25 t-codes used for?

695


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

732


What are st01 t-codes used for?

726


Authorization check on s_btch_job failed. What would happen now?

778


What are pfud t-codes used for?

691