your functional team has asked you to provide the seurity
for a tcode.how do you go about it?
Answers were Sorted based on User's Feedback
Answer / naveen kumar
As a part of a security the functional consultant must give
wht r the tcode that are to be secure and not to be given
to end user depending on that we perpare a matrix
and then we create a role for the each indiviual matrix
assign to end user according to there business requirement
and thus we restrict the user for using of critical tcodes
we should not give SAP_All,SAP_NEW profiles to any user
inthe oragnization until unless told if u also give put a
trace on for that particular user id
Is This Answer Correct ? | 8 Yes | 3 No |
What is Use Of SM35P and SM35 , Is there any difference between these two ?
Whr will u find u Error logs in BI security and What are Error logs will come and how will u solve that
hi , can any one say what is the exact use of SNC TAB IN SU01,IF IT IS EXTERNAL SECURITY PURPOSE ,WHAT KIND OF SECURITY PURPOSE?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What does the profile generator do?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
SU25 Step6 How Roles are created through Profiles?
Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
What are suim t-codes used for?
a user is not able to execute a t-code ; hou do u solve that ? wat are the difft reasons that might be existing ?
what is the procedure for deleting a role?
Can you explain internet-level security?