venkat


{ City }
< Country > india
* Profession *
User No # 104001
Total Questions Posted # 1
Total Answers Posted # 13

Total Answers Posted for My Questions # 2
Total Views for My Questions # 14707

Users Marked my Answers as Correct # 49
Users Marked my Answers as Wrong # 6
Questions / { venkat }
Questions Answers Category Views Company eMail

In which scenario we use SUPC

HCL,

2 SAP Security 14707




Answers / { venkat }

Question { Accenture, 23520 }

i need to give authorisation to a user to su01 tcode but
the delete options should not work..i,e the user should be
able to Create,disp,change etc but not delete on su01. how
cam i do this?


Answer

Restrict the activity 06 in authorization object S_USR_GRP.

Thanks,

Venkat

Is This Answer Correct ?    3 Yes 0 No

Question { IBM, 11141 }

what is role matrix


Answer

Role matrix is combination of two or more different Tcodes
(i.e, Business processes).

Matrix will be designed based on business user requirement
and there should not be conflict between two or more
different processes, this can be found using matrix easyly.

Thanks,

Venkat

Is This Answer Correct ?    1 Yes 0 No


Question { 7593 }

Is there any transaction to see Transport Log. Means, Which
data or roles have been transported from which system at what
time ?


Answer

In SE01 select the transport request which you want to see
the log and on the top you can find the log icon click on
the icon and you find the transport log of the transport
request when it is moved and to which system and you can
find the object which have been moved using '+' icon in the
transport log.

Thanks,

Venkat

Is This Answer Correct ?    1 Yes 0 No

Question { HP, 7379 }

Q6)
When do you get a screen for
" maintaining the authorization values for org elements "
in PFCG ???
(i.e..screen you get thru PFCG --> AUTHORIZATION tab -->
CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG
ELEMENT VALUES )


Answer

Tcodes and respwective related authorization objects
related to functional module.

As also this depends up on the business requirement.

Thanks,

Venakt

Is This Answer Correct ?    0 Yes 0 No

Question { IBM, 7171 }

How we do Scheduled jobs in background to cleanup spool
request, dumps


Answer

Hi,

Find the below background jobs,

SAP_REORG_ABAPDUMPS --> To clean up short dumps.

SAP_REORG_SPOOL --> To clean up spool requests.

Thanks,

Venkat

Is This Answer Correct ?    2 Yes 0 No

Question { IBM, 5919 }

How we Schedul and administering Background jobs.


Answer

Using SM36 you can create / Maintain / Change the
background jobs.

Using SM37 you can monitor background jobs.

Thanks,

Venkat

Is This Answer Correct ?    1 Yes 0 No

Question { IBM, 9384 }

how to resolve role conflict


Answer

Hi,

Role conflict can be resolved by using GRC Access Risk
Analysis tool in GRC Access Control(AC) component.

Thanks,

Venkat

Is This Answer Correct ?    1 Yes 0 No

Question { 18794 }

what is the difference between su25 & su24 , when we can
make the authorization checks in su25 then what is the use
of su24


Answer

Su24->To check the authorizaation object for the TCode.

SU25--> For perfomring the actions after fresh installation

After upgrade and so on, please got through the tcode SU25
you can find the oprions there.

Thanks,

Venkat

Is This Answer Correct ?    0 Yes 0 No

Question { 10120 }

how to delete a single role,the single role is existing with 10 users


Answer

As business specific why to delete the role, simply remove
the role to which user it has assigned.
If you delete the role users will loose the authorization.

Still you want to delete role use tcode PFCG, give the role
name and click on delete icon it will prompt with transport
request include the objects in the transport and release it
using SE01 or SE10 tcodes now the role will get deleted.

Thanks,

Venkat

Is This Answer Correct ?    0 Yes 0 No

Question { Cognizant, 14049 }

in which table we can find all authorization groups


Answer

Table for authorizzation groups is TBRG.

Thanks,

Venkat

Is This Answer Correct ?    3 Yes 0 No

Question { CTS, 11121 }

different b/w Direct assigment and indirect role in bi
security whn will go direct assignment


Answer

Direct role assignment involves assignment of roles using
PFCG to the user directly.

Indirect role assignment involves in assignment of role to
positions when ever an employee moves to other position he
will get the access of the new automatically and here we
can reduce the user admin process time.

Thanks,

Venkat.

Is This Answer Correct ?    3 Yes 5 No

Question { 8829 }

Hi
we are working on the one company but location are different one location we are restrict the user pass word length 8 characters another location pass word length 10 characters but client is same and also we are maintaining the one app server.

Could please help on this


Answer

Hi,

It is not possible to maintain different password scenario
for different plant locations.

Password length is based on profile parameter, not on the
basis of authorization object.

Thanks,

Venkat

Is This Answer Correct ?    15 Yes 0 No

Question { IBM, 10901 }

What is the benefits of ticketing tool?


Answer

1) Users can log there issues in the ticketing tool.

2) Can get the update of the issue status.

3) Have track of the issues.

Features varies from tool to tool.

Thanks,

Venkat

Is This Answer Correct ?    19 Yes 1 No