Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
1 3111Q)if u r using 10 firefighter ids at a time? How will the log reports goes to controller? Q)wt is ruleset? and how to update risk id in rule set? Q)wt is the procedure for Role modifications?explain with example? Q)who will done user comparision?
2 9860What is the maximum number of profiles in a role ? What is the maximum number of authorization objects in a role? What is the maximum number of authorization in an object ?
5 27897How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?
2 131591)What does the Profile Generator do? 2)What is the main purpose of Parameters, Groups & Personalization tabs 3)in SU01? purpose of Miniapps in PFCG? 4)What happens to change documents when they are transported to the production system? 5)what are the issues you faced with UME? 6)what is the Ticketing tool that you are using in your organisation?and explain? 7)what do you know abt LSMW? 8)Difference b/w su22 and su24 ? 9)what is the landscape of GRC? 10)What is the difference between Template role & Derive role?
TCS,
4 143861) Explain me about your SAP Career? 2) Tell me your daily monitoring jobs and most of them you worked on? 3) which version of SAP are you working on? Is it a java stack or abap stack? 4) Tell me about derived role? 5) what is the main difference between single role and a derived role 6) Does s_tabu_dis org level values in a master role gets reflected in the child role?? 7) Tell me the steps to configure CUA? 8) Is RAR a java stack or Abap Stack? 9) What is the report which states the critical T-codes? and also What is the T-code? 10) What is the T-code to get into RAR from R/3? 11) Explain about SPM?
TCS,
2 15075Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
1960we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem
8 15371How to control user only can schedule immediate background job but cannot schedule period background job?
Sony,
2 7755(1)Difference between usobt_c and usobx_c?(2)What are usobt and usobx tables for?(3)Difference between usobt and usobt_c?(4)Se93.How u create custom t-codes?(5)Difference b/w customizing request and workbench request?(6)To trnsprt sU24 setting which is used is it customizing or workbench request?(7)If we add org level elements in a master role will it reflect in child role and how AGR_1252 will act as a barrier?(8)How to do mass user to role assignment using secatt, will u use su01 or su10?Explain why you will use SU10 not SU01?(9)Can SU10 can be used for mass password reset?Why not?(10)If you want to reset the password for say 100 users in Production how will you do?(11)Expalian Steps 2A and 2B in SU25?
HCL,
6 318201.WHAT IS DIFFERENCE B/W OWNER,CONTROLER AND ADMINISTRATOR IN FF? 2.WHAT IS THE DIFFERENCE B/W THESE PERSONS ROLES? 3.WHAT IS THE ONLINE AND OFFLINE RISKS?
5 16881what is the table to find out roles for which profile are not genarated and genarated.I mean to say table to find the roles in which the authorization tab is green and roles in which authorization tab is red.
2 10789Post New SAP Security Questions
Which t-code can be used to delete old security audit logs?
Can you explain document transfer-level security?
Is it possible to change role template? How?
What does the pfcg_time_dependency clean up?
By which parameter number of entries are controlled in the user buffer?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
what is hypercare and go live support?
what is the process to find that one consultant had removed a table from sap tables
How to codify for an Item in SAP? How many digits are required for an item?
How to find ECC system, GRC system and BI system ?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Which tables will you use for making customizing setting for security administration?
Explain protecting public keys?
Is it possible to have more than one st of org-level values in one role? Explain your answer.