1) Explain me about your SAP Career?
2) Tell me your daily monitoring jobs and most of them you
worked on?
3) which version of SAP are you working on? Is it a java
stack or abap stack?
4) Tell me about derived role?
5) what is the main difference between single role and a
derived role
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
7) Tell me the steps to configure CUA?
8) Is RAR a java stack or Abap Stack?
9) What is the report which states the critical T-codes? and
also What is the T-code?
10) What is the T-code to get into RAR from R/3?
11) Explain about SPM?
Answers were Sorted based on User's Feedback
Answer / sudha
4) Tell me about derived role?
Ans:Derived roles..To restrict the user access based on
organizational level values.
Derived role will be inherited by master role and inherit
all the properties except org level values.
5) what is the main difference between single role and a
derived role?
Ans:Main difference--we can add/delete the tcodes for the
single roles but we cann't do it for the derived roles.
6) Does s_tabu_dis org level values in a master role gets
reflected in the child role??
Ans:If we do the adjusted derived role in the master role
while updating the values in the master role thn values will
be reflected in the child roles.
10) What is the T-code to get into RAR from R/3?
Ans:/virsar/ZVRAT
11: Explain about SPM?
Ans:SPM can be used to maintain and monitor the super user
access in an SAP system. This enables the super-users to
perform emergency activities and critical transactions
within a completely auditable environment. The logs of the
SPM user IDs helps auditors in easily tracing the critical
transactions that have been performed by the Business users
Is This Answer Correct ? | 11 Yes | 1 No |
Ans 1) Elaborate about your complete SAP experience
and yes be true with them.
Ans 2) As a part of my daily job being a SAP Security
consultant i have to take care of tickets monitoring and
assigning them within the team. I have to take care of
critical incidents and emphasize themon high priority for
their faster resolution. I have to troubeshoot different
authorization issues that come across in daily work with
the users.
Ans 3) You have to check this with your systems.
Ans 8) RAR is Java stack. It was ABAP when it was called as
Complance Calibrator.
Ans 9) RSUSR005
Is This Answer Correct ? | 5 Yes | 0 No |
How to update risk id in rule set?
in my production system there are some 20 roles created in the production system itself without following the standard procedure of creating in dev testing it qas and then moving it to prd.so how do you find out all the roles created in prd system?
How can we maintain Organizational values? How can we create Organizational values? What is the purpose of these Org. values?
what is user base in sap security?
How I can reset the DDIC user's password? I have changed it from the delivered default?
Difference between User Group in "Logon data" and "Groups" tab in SU01
Which of below authorization object that protect transaction code execution? A. S_TCODE B. P_TCODE C. Q_TCODE D. X_TCODE
6 Answers Cap Gemini, SAP Labs,
Explain network topology in sap systems?
Hi we are working on the one company but location are different one location we are restrict the user pass word length 8 characters another location pass word length 10 characters but client is same and also we are maintaining the one app server. Could please help on this
what is the difference between copied and derived role?
what is the main differene between roe and profile?
What is the use of su56?