SAP Security Interview Questions
Questions Answers Views Company eMail

What authorization is required to create and maintain user master records?

871

How to find out who has deleted users in the system?

891

Can you explain sap system transactions?

863

How can you get the user list in sap?

1 1952

What is sap’s grc?

930

What are the most used tables in sap?

922

Which transaction code is used to manage lack entries?

1 1920

What is the difference between authorization object and authorization object class?

885

Can you explain internet-level security?

870

Can you explain network topology in sap systems?

804

Can you explain transport system-level security?

859

What is t code?

881

What is sap internet transaction server?

895

Can you explain protecting public keys?

814

What is stad?

917


Post New SAP Security Questions

Un-Answered Questions { SAP Security }

How do you check background jobs?

918


what is centralize FFID?

1817


what is the critical issue u are faced in your previous experience

1655


What is the procedure for role modifications?

878


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2423


Which tables will you use for making customizing setting for security administration?

936


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2218


What are the upgrades happened in GRC 5.3 from GRC 5.2?

3952


Explain x-glueb and its use in sap security.

1040


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

6757


What authorization are required to create and maintain user master records?

883


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2042


What are pfud t-codes used for?

878


What is the maximum number of profiles in a role and maximum number of object in a role?

810


What profile versions?

981