SlideShare ist ein Scribd-Unternehmen logo
1 von 6
1. What isreference user type?
Reference usernameused to assigndelegation/tempaccesstoa user
i.e examplea user is going for a holiday during that timeweneed to assign
another employee to take responsibilitytoavoid business impact, sothat
canbe achieved using referenceuser type, You canassigna ref user in roles
tab
2. How do you createan authorizationobject?
Go to SU21 and select authorizationclassand createanauthorizationobject
and maintainauthorizationfieldsand maintainauthoritycheckfor it
3. Is it possible to convert authorizationfieldsintoorganizationfieldsand
what are theexception/restrictionsfor it?
ABAP report PFCG_ORGFIELD_CREATE used to convert authorization
fields into ORG level, similarlyreport PFCG_ORGFIELD_DELETE used to
convert org level field intonon org fields
a. Only createOrganizationallevel fields beforeyou start setting up your
system. If you createorganizationallevel fields later, the authorizationdata
for roles may have to be post processed.
b. Thefields "Activity", "ACTVT"and "Transactioncode", "TCD" cannot
be converted into an organizationallevel field.
Refer: OSS note 323817
4. How do you extract user emailaddress?
USR21 and ADR6 tablesare used to get user email addressin SAP.
Enter the usernamein USR21tcode and executeit, now you will get
“person number” and copy it which users emailaddress required and enter
those person numbersto ADR6 tableand executeit and you will get the
emailaddress
5. How to extract parent and derived role relation?
TableAGR_DEFINE used to check parent and derived role relationship
6. How do you createauthorizationgroups?
SE54 tcodeused to createauthorizationgroupsfor tablesand programs
7. How do you restrict a tableto particularpersonor team?
Createan authorizationgroup for the tablewhich needs to be protected and
add the auth group to S_TABU_DIS auth object filed value and give it
activitieslike, create, delete, display, etc..
8. In which table you will checkauthorizationgroup created for a particular
table?
TBRG tableused to check availableauthorizationgroupsand TBRGT holds
auth group with description
9. What arethe ORG fields in sap?
1. Companycode
2. Controlling area
3. Division
4. Salesorganization
5. Plant
6. Business area
7. Purchasingorganization
8. Credit control area
9. Account type
10. What arestatuslight in authorizationpagefor authorizationfieldsin
PFCG?
1. Red – Org level not maintained
2. Yellow – atleast one filed left open
3. Green – all fields are maintained
11. What isthe differencebetweenR/3 securityand BW security?
R/3 securitymainlybased on transactionand controlled via authorization
objectsusing profiles and roles
BW securityis mainlybased on analysisauthorizationusing RSECADMIN
tcodeand very few tcodescompareto R/3 and we should secureInfo
objects, info cubes, ODS and quires
BW authorizationsareprimarilyfocused on data not on transactioncodes
and divided intotwo mainareasauthorizationfor administratorworkbench
and authorizationfor businessexplorer
Authorizationobjectsfor field level securityin reporting arecreated asand
when needed.
12. Which authorizationobjectgivesend user to execute/view a queryin
BW?
- S_RS_COMP
- S_RS_COMP1
- S_RS_FOLD
13. What isthe use of SU24 tcode?
SU24(checkindicator) holdsthe relationship betweentcodeand
authorizationobjectsincustomer tablesUSOBX_Cand USOBT_C tables
which values are pulled during role creation
SU24 used to maintainallthe objectsthat arechecked during tcode
execution
14. How do you check authorizationcheckfor a tcode?
Check SU24 for authorizationobjectand itsproposalalso we cancheck the
ABAP report as well
15. What is the authorizationobject which givesdeveloper debug
authorization?
S_DEVELOP with activity01, 02 or 03
16. How do you secure/giveaccessto a custom report to users
without giving SE38tcodeaccess?
Createan authorizationgroup for that report to secure it and giveSA38
tcodeauthorizationfor executionofthe custom report or createa custom
transactioncodeand maintainauthoritycheckand assignto users via role.
17. How do you createa custom tcode?
SE93 is the tcodeused to createa custom tcode
18. How do you createa transport request?
SE01, SE09, SE10 tcodesare used to createa transport request and also we
cancreateduring customizationtimelike, PFCG, SE38, BD54, etc..
19. What arethe types of transport requests?
- Custom transport request
- Workbench transport request
- Transport of copies
- Relocation
20. What is the differencebetweencustom and workbench transport
requests?
- Workbench requestsarethose involve changesto cross client
customizing and repositoryobjects, thoseobjectsareindependent of the
client and the requestsareused to transport changed repositoryobjectsand
changed system settingsfrom cross client tables
- Customizing requestsinvolve changesto client dependent objects, so
custom transport request used to copy and transport requeststhat are
client specific
21. How do you schedule a background job
SM36 used to schedule background jobs
22. Have you worked on upgradeand stepsinvolved?
Yes
2A. Comparewith SAP values
2B. Compareaffected transactioncodes
2C. Roles to be checked
2D. Display changed transactioncodes
23. What is expert modein PFCG?
Expert mode in PFCG used to maintainexistingrolesit has following
options
- Delete and recreateauthorizationand profiles
- Edit old status
- Read old statusand mergewith new data
24. Which tableyou cancheckthe relationbetween compositerolesand
child roles?
AGR_AGRS
25. What arethe license types you assignto end users while creating it?
- Applicationprofessionalusers
- Applicationlimited professionalusers
- ApplicationESS user
26. You are not allowed to assignany roles to user profile further what
would be the reason for it?
User must have exceeded the limitationfor profiles assignment i.e312
27. Have you worked with auditors?
Yes with internalauditorsand explainit
28. Which tableused to view roles and org level values?
TableAGR_1252 maintainsrelationship betweenrolesand org field values
29. Which tableused to view roles and authorizationobjectsand itsvalues?
TableAGR_1251maintainsrelationshipbetweenroles, authorization
objectsand its field values
30. Where do you delete old audit logs?
SM18
31. Wheredo you look lock entries?
SM12
32. Which authorizationobject givesyou SM12 authorizationother than
S_tcode?
S_ENQUE
33. Wheredo you reset user buffer?
SU56
34. What is the mandatory field in addresstab in SU01?
Last Name
35. How do you lock a tcode?
SM01tcodeused to lock a tcode
36. Which tablestores all ABAP reports?
TRDIR
37. How do you lock users who didn’t log in to SAP morethan 90 days?
USR02 tableswe canget last login dateand time
38. Which tableholds all valid activityfields?
TACTZ
39. ABAP report which is used for user reconciliation?
PFCG_TIME_DEPENDENCY
40. Tablewhich holds all possible authorizationfieldsas variables
USVAR

Weitere ähnliche Inhalte

Was ist angesagt?

081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRCAnil Kumar
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
BI Security (1).ppt
BI Security (1).pptBI Security (1).ppt
BI Security (1).pptcsekar2
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security SAP Technology
 
Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security Bharath Trainings
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricksJasbir Khanuja
 

Was ist angesagt? (20)

081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
Sap Security
Sap SecuritySap Security
Sap Security
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Cua setup procedure SAP security
Cua setup procedure SAP securityCua setup procedure SAP security
Cua setup procedure SAP security
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
BI Security (1).ppt
BI Security (1).pptBI Security (1).ppt
BI Security (1).ppt
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
 
Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricks
 

Ähnlich wie SAP Security interview questions

CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxCMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxmary772
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with PrivacyIRJET Journal
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI tools
 
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docxBoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docxjasoninnes20
 
Software Requirements
Software RequirementsSoftware Requirements
Software RequirementsBala Ganesh
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET Journal
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationskylan2
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docxMoorthy Esakky
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements EngineeringEhsan Elahi
 
Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1hani2253
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Projecthani2253
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesIRJET Journal
 
Future fashion report
Future fashion reportFuture fashion report
Future fashion reportlokeshboran
 
Ch 1-Introduction.ppt
Ch 1-Introduction.pptCh 1-Introduction.ppt
Ch 1-Introduction.pptbalewayalew
 
27 pso business_requirements
27 pso business_requirements27 pso business_requirements
27 pso business_requirementsMarcelo Mesti
 

Ähnlich wie SAP Security interview questions (20)

CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxCMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
 
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docxBoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specifications
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docx
 
BikramSamaddar
BikramSamaddarBikramSamaddar
BikramSamaddar
 
SRS.pdf
SRS.pdfSRS.pdf
SRS.pdf
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Software requirement specification(SRS)
Software requirement specification(SRS)Software requirement specification(SRS)
Software requirement specification(SRS)
 
Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
Day01 01 software requirement concepts
Day01 01 software requirement conceptsDay01 01 software requirement concepts
Day01 01 software requirement concepts
 
Future fashion report
Future fashion reportFuture fashion report
Future fashion report
 
Ch 1-Introduction.ppt
Ch 1-Introduction.pptCh 1-Introduction.ppt
Ch 1-Introduction.ppt
 
27 pso business_requirements
27 pso business_requirements27 pso business_requirements
27 pso business_requirements
 

Mehr von Siva Pradeep Bolisetti

Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...Siva Pradeep Bolisetti
 
Sappress sap governance risk and compliance
Sappress sap governance risk and complianceSappress sap governance risk and compliance
Sappress sap governance risk and complianceSiva Pradeep Bolisetti
 
How to improve user experience via roles
How to improve user experience via rolesHow to improve user experience via roles
How to improve user experience via rolesSiva Pradeep Bolisetti
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Bearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELBearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELSiva Pradeep Bolisetti
 

Mehr von Siva Pradeep Bolisetti (10)

Step by step exercise for bw 365
Step by step exercise for bw 365Step by step exercise for bw 365
Step by step exercise for bw 365
 
Solar refrigeration system
Solar refrigeration system Solar refrigeration system
Solar refrigeration system
 
Welding and types
Welding and types Welding and types
Welding and types
 
Use of network scheduling technique
Use of network scheduling technique Use of network scheduling technique
Use of network scheduling technique
 
Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
Sappress sap governance risk and compliance
Sappress sap governance risk and complianceSappress sap governance risk and compliance
Sappress sap governance risk and compliance
 
How to improve user experience via roles
How to improve user experience via rolesHow to improve user experience via roles
How to improve user experience via roles
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELBearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHEL
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

SAP Security interview questions

  • 1. 1. What isreference user type? Reference usernameused to assigndelegation/tempaccesstoa user i.e examplea user is going for a holiday during that timeweneed to assign another employee to take responsibilitytoavoid business impact, sothat canbe achieved using referenceuser type, You canassigna ref user in roles tab 2. How do you createan authorizationobject? Go to SU21 and select authorizationclassand createanauthorizationobject and maintainauthorizationfieldsand maintainauthoritycheckfor it 3. Is it possible to convert authorizationfieldsintoorganizationfieldsand what are theexception/restrictionsfor it? ABAP report PFCG_ORGFIELD_CREATE used to convert authorization fields into ORG level, similarlyreport PFCG_ORGFIELD_DELETE used to convert org level field intonon org fields a. Only createOrganizationallevel fields beforeyou start setting up your system. If you createorganizationallevel fields later, the authorizationdata for roles may have to be post processed. b. Thefields "Activity", "ACTVT"and "Transactioncode", "TCD" cannot be converted into an organizationallevel field. Refer: OSS note 323817 4. How do you extract user emailaddress? USR21 and ADR6 tablesare used to get user email addressin SAP. Enter the usernamein USR21tcode and executeit, now you will get “person number” and copy it which users emailaddress required and enter those person numbersto ADR6 tableand executeit and you will get the emailaddress 5. How to extract parent and derived role relation? TableAGR_DEFINE used to check parent and derived role relationship 6. How do you createauthorizationgroups? SE54 tcodeused to createauthorizationgroupsfor tablesand programs 7. How do you restrict a tableto particularpersonor team?
  • 2. Createan authorizationgroup for the tablewhich needs to be protected and add the auth group to S_TABU_DIS auth object filed value and give it activitieslike, create, delete, display, etc.. 8. In which table you will checkauthorizationgroup created for a particular table? TBRG tableused to check availableauthorizationgroupsand TBRGT holds auth group with description 9. What arethe ORG fields in sap? 1. Companycode 2. Controlling area 3. Division 4. Salesorganization 5. Plant 6. Business area 7. Purchasingorganization 8. Credit control area 9. Account type 10. What arestatuslight in authorizationpagefor authorizationfieldsin PFCG? 1. Red – Org level not maintained 2. Yellow – atleast one filed left open 3. Green – all fields are maintained 11. What isthe differencebetweenR/3 securityand BW security? R/3 securitymainlybased on transactionand controlled via authorization
  • 3. objectsusing profiles and roles BW securityis mainlybased on analysisauthorizationusing RSECADMIN tcodeand very few tcodescompareto R/3 and we should secureInfo objects, info cubes, ODS and quires BW authorizationsareprimarilyfocused on data not on transactioncodes and divided intotwo mainareasauthorizationfor administratorworkbench and authorizationfor businessexplorer Authorizationobjectsfor field level securityin reporting arecreated asand when needed. 12. Which authorizationobjectgivesend user to execute/view a queryin BW? - S_RS_COMP - S_RS_COMP1 - S_RS_FOLD 13. What isthe use of SU24 tcode? SU24(checkindicator) holdsthe relationship betweentcodeand authorizationobjectsincustomer tablesUSOBX_Cand USOBT_C tables which values are pulled during role creation SU24 used to maintainallthe objectsthat arechecked during tcode execution 14. How do you check authorizationcheckfor a tcode? Check SU24 for authorizationobjectand itsproposalalso we cancheck the ABAP report as well 15. What is the authorizationobject which givesdeveloper debug authorization? S_DEVELOP with activity01, 02 or 03 16. How do you secure/giveaccessto a custom report to users without giving SE38tcodeaccess? Createan authorizationgroup for that report to secure it and giveSA38 tcodeauthorizationfor executionofthe custom report or createa custom transactioncodeand maintainauthoritycheckand assignto users via role. 17. How do you createa custom tcode? SE93 is the tcodeused to createa custom tcode
  • 4. 18. How do you createa transport request? SE01, SE09, SE10 tcodesare used to createa transport request and also we cancreateduring customizationtimelike, PFCG, SE38, BD54, etc.. 19. What arethe types of transport requests? - Custom transport request - Workbench transport request - Transport of copies - Relocation 20. What is the differencebetweencustom and workbench transport requests? - Workbench requestsarethose involve changesto cross client customizing and repositoryobjects, thoseobjectsareindependent of the client and the requestsareused to transport changed repositoryobjectsand changed system settingsfrom cross client tables - Customizing requestsinvolve changesto client dependent objects, so custom transport request used to copy and transport requeststhat are client specific 21. How do you schedule a background job SM36 used to schedule background jobs 22. Have you worked on upgradeand stepsinvolved? Yes 2A. Comparewith SAP values 2B. Compareaffected transactioncodes 2C. Roles to be checked 2D. Display changed transactioncodes 23. What is expert modein PFCG? Expert mode in PFCG used to maintainexistingrolesit has following options - Delete and recreateauthorizationand profiles - Edit old status - Read old statusand mergewith new data 24. Which tableyou cancheckthe relationbetween compositerolesand
  • 5. child roles? AGR_AGRS 25. What arethe license types you assignto end users while creating it? - Applicationprofessionalusers - Applicationlimited professionalusers - ApplicationESS user 26. You are not allowed to assignany roles to user profile further what would be the reason for it? User must have exceeded the limitationfor profiles assignment i.e312 27. Have you worked with auditors? Yes with internalauditorsand explainit 28. Which tableused to view roles and org level values? TableAGR_1252 maintainsrelationship betweenrolesand org field values 29. Which tableused to view roles and authorizationobjectsand itsvalues? TableAGR_1251maintainsrelationshipbetweenroles, authorization objectsand its field values 30. Where do you delete old audit logs? SM18 31. Wheredo you look lock entries? SM12 32. Which authorizationobject givesyou SM12 authorizationother than S_tcode? S_ENQUE 33. Wheredo you reset user buffer? SU56 34. What is the mandatory field in addresstab in SU01? Last Name 35. How do you lock a tcode? SM01tcodeused to lock a tcode
  • 6. 36. Which tablestores all ABAP reports? TRDIR 37. How do you lock users who didn’t log in to SAP morethan 90 days? USR02 tableswe canget last login dateand time 38. Which tableholds all valid activityfields? TACTZ 39. ABAP report which is used for user reconciliation? PFCG_TIME_DEPENDENCY 40. Tablewhich holds all possible authorizationfieldsas variables USVAR