Could you please let me know the exact step by step process
for the following Questions.

1.How to get the E-Mail address for 100 users at a time.
2.While Creating BW roles what are the Authorization Objects
we will use.
3.While Creating Single role what will be happened in the
functional side, when entered the Template role in the
derived role tab.
4.when we changed the password for more users(for
example:100 users) where the password will be stored or from
where you can Re-Collect the password and how will you
Communicate the password to all users at a time.
5.What is Virsa? Once you entered in to the screen what it
will perform.
6.What is the use of SU24 & SM24.
7.While Creating BW roles what are the Authorization Objects
we will use.
8.While Creating Single role what will be happened in the
functional side, when you entered the Template role in the
derived role tab.
9.What is Dialog users, Batch users and Communicate users.
What is the use with Communicate user.
10.Can we add one Composite role in to another Composite
role at any urgent user requests or in normal user requests.
11.In Transport what type of Request we will use.Why don't
we use Workbench request in transport.
12.When we added Authorization Object in Template role, at
the same time what will be happen in Derived role.
13.How to Check Profile parameter. And how to find whether
any transport has ended with error and where we can check.
14.How to Extract users list like who didn't login since 3
months. And In 90 Days user Locking in which table we will use.
15.What is OSS Connection and System Opening and why we have
to open these.
16.What will have in one single role and how many prifiles
will be in one sap cua system.
17.What is the difference between Template role & Derive role.

Answer Posted / karunakar

Hi Friend,
5 . Virsa is a company which was developed the tools like
Compliance calibrator , access enforcer, Role expert, fire
fighter, from above some of the tools are used for security
operations like risk analysis ,

6. su24 we use this t code to know the relationship between
tcode and authorization object an also we maintain the check
indicators for the t codes and we need to maintain them in
authorization tab of pfcg,

10. it is not possible to add one composite role to another
composite role,

11. there are 4 types of TR 1.customizing TR, 2.WB TR,
3.Transport of copies 4.Relocation of objects

14. we can extract the user with RSUSR200 who are not logged
in for last 3 months, the table is USR02 Field UFLAG, if the
value is 64 then the user is locked,

17. Template role is a role which is sap standard role it
contains all authorizations and t codes defined by sap,
derived role is a tole which created from the parent role ,
we create the derive role to restrict the role to some org
levels,

Please let me know if i am wrong

Is This Answer Correct ?    2 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

607


How we Educated client personnel in R/3 Security and general Basis knowledge

1806


what are the issues you faced with UME?

2456


what is the critical issue u are faced in your previous experience

1435


Any details about secatt apart from SAPSecurity online.com?

1916






How we schedule and administering background jobs?

667


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

707


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

1689


What is the maximum number of profiles in a role and maximum number of object in a role?

632


Explain internet-level security?

649


Can you explain sap system transactions?

695


What is sap internet transaction server?

708


what is the main difference between the derived role and a single role?

698


What is the use of su56?

701


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2369