SAP Security Interview Questions
Questions Answers Views Company eMail

What is the difference between c (check) and u (unmaintained)?

1103

How many authorizations fit into a profile?

1 1480

What happens to change documents when they are transported to the production system?

1186

What is the difference between the table buffer and the user buffer?

747

What does user compare do?

695

What are su01d t-codes used for?

1 1226

Pfcg proposed activities but you need only two. What would you do?

673

What are su10 t-codes used for?

1 1149

A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

717

What is the use of tmssup* rfc destinations?

1749

What are se10 t-codes used for?

707

Differentiate between derived role and composite role

665

How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

635

What are pfcg t-codes used for?

1 1396

You want to remove a developer's and developer keys from a system. How would you do that?

638


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

What is audit information system?

722


What does the pfcg_time_dependency clean up?

814


What are st01 t-codes used for?

738


Which transaction should not be given to BASIS and DEV team in Production?

1919


How do we test security systems.

660






Is there a table for authorizations where I can quickly see the values entered in a group of fields?

763


In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?

550


Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar

1800


Explain snc in sap security?

714


Explain secure store and forward?

632


what things you have to take care before executing run system trace?

756


How we Educated client personnel in R/3 Security and general Basis knowledge

1806


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

707


what is authorization object and authorization object class?

770


How do you check background jobs?

747