SAP Security Interview Questions
Questions Answers Views Company eMail

What is the difference between c (check) and u (unmaintained)?

1453

How many authorizations fit into a profile?

1 1850

What happens to change documents when they are transported to the production system?

1449

What is the difference between the table buffer and the user buffer?

955

What does user compare do?

997

What are su01d t-codes used for?

1 1673

Pfcg proposed activities but you need only two. What would you do?

892

What are su10 t-codes used for?

1 1449

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

953

What is the use of tmssup* rfc destinations?

2183

What are se10 t-codes used for?

898

Differentiate between derived role and composite role

855

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

827

What are pfcg t-codes used for?

1 1715

You want to remove a developer's and developer keys from a system. How would you do that?

871


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What are some ap security t codes?

900


how we do CUA configuration in Quality system

2173


How we schedule and administering background jobs?

845


Userdone tasks with ffid n system send log reports to controller in his work inbox but whenever its open its showing blank screen, why?

1822


What is the difference between the table buffer and the user buffer?

955


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4220


What is the procedure for role modifications?

890


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

1995


How can sap security be improved?

872


How to find out who has deleted users in the system?

902


When would you update a sap table directly? What precautions would you taje?

980


Which transaction code is used to display the user buffer?

902


what is user base in sap security?

1403


What are the different types of sap security tables?

857


You want to create and maintain user master record. What authorization would you need?

937