SAP Security

  Home  Enterprise Resource Planning  SAP Security


“SAP Security frequently Asked Questions in various SAP Security job Interviews by interviewer. Get preparation of SAP Security job interview”



32 SAP Security Questions And Answers

2⟩ One of the user logged into Production System, changed a table and then logged out. How will you track him?

We need to login to the system the change has taken, Go to

SM20 you need to select the date and time or range in time

tab, select * in the user tab once you key in all the

inputs be sure to select the servers or instance on left

hand side and then execute.

you need to select the user master record.

You will get report for user master record, find the user

id in the list

 196 views

3⟩ How to lock all the users at a time?

This is one way to lock the users by executing Tcode EWZ5.

another way is by executing su10... authoriztion tab....

evaluate the users list......... transfer...... execute

 189 views

5⟩ What is use of derived roles and where it is used?

Derived roles are also called as Child Roles and Master

Roles are called as Parent Roles.

Derived Roles refers to the roles that already exist. As

name indicates Derived roles are derived from other role

(Master Role).

Derived ROles inherits the menu structure and functions

included (transactions, reports, Weblinks and so on) from

the role referenced.

The default authorization values of the derived role are

that of the inherited role. The Org Levels are to be

maintained in the derived Role

 205 views

6⟩ What is use of su56?

Displays the current users Authorization Profiles available

ti the ID. Can also be used to reset their User buffer to

pick up new roles and authorizations.

 204 views

10⟩ Tell me about derived role?

Derived roles..To restrict the user access based on

organizational level values.

Derived role will be inherited by master role and inherit

all the properties except org level values.

 193 views

12⟩ What is offline risk analysis?

Offline Mode Risk Analysis process is performed with the help of Risk Identification and Remediation module in SAP GRC Access Control Suite. Offline mode Analysis helpos in identifying SOD Violations in an ERP System remotely. The data from system is exported to flat files and then it can be imported into the CC instance with the help of data extractor utility.

It can also be used to remotely analyze an ERP system which may be present in a different ERP Landscape.

 200 views

13⟩ How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

Before adding custom t-code to a role we should see if there any authorization objects maintained for this t-code in SU24, If not we should maintain. Also we need to find authority check in the program related to the custom t-code by using t-code SE93. If the custom t-code doesnt have auth object sas an exception it should all authorization groups S_TABU_DIS. If the t-code satisfies any one condition we can save and generate the role.

 230 views