1).what is the diff b/w adding the tcode in s_tcode authorization object and addind the tcode inmenu tab of pfcg? 4) What is the difference between Owner, Controller and Administrator in Firefighter? 2) Can you tell me why do you use S_TABU_DIS authorization object? 3) Explain How do you restrict a particular table acces then? 5)In RAR ,What are the default Back ground Jobs? 6)Which job will update all user master records? 7)What will happen whenever we execute a t-code? 8)What is the purpose of the report RSUSR006? 9) Lets say a user is locked by admin? What value will you see in USR02 table and in UFLAG column? 10) What will you do if the user complains that he is not able to access a t-code? 11)why we have to delete users ? 12)a. What is Direct role assignment and indirect role assignment? b. What is the process of adding a t-code to an existing role? c. If client asked you to modify a role directly in PRODUCTION for emergency? Is it possible? What you will do in that situation? d. What is the purpose of customized Transaction codes? Have you created any custom t-codes? 13)
IBM,
3 19087If SU53 screenshot does not give anything then How will you find the solution? If there is no relevant Role , then How?
IBM,
3 10333Post New SAP Security Questions
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
Differentiate between derived role and composite role
What are su25 t-codes used for?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what is centralize FFID?
What is the difference between authorization object and authorization object class?
How to find ECC system, GRC system and BI system ?
What are su53 t-codes used for?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How to do Role Design, Testing and Implementation
what is user base in sap security?
What are se10 t-codes used for?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Can you explain document transfer-level security?
What happens to change documents when they are transported to the production system?