(1)Difference between usobt_c and usobx_c?(2)What are usobt
and usobx tables for?(3)Difference between usobt and
usobt_c?(4)Se93.How u create custom t-codes?(5)Difference
b/w customizing request and workbench request?(6)To trnsprt
sU24 setting which is used is it customizing or workbench
request?(7)If we add org level elements in a master role
will it reflect in child role and how AGR_1252 will act as
a barrier?(8)How to do mass user to role assignment using
secatt, will u use su01 or su10?Explain why you will use
SU10 not SU01?(9)Can SU10 can be used for mass password
reset?Why not?(10)If you want to reset the password for say
100 users in Production how will you do?(11)Expalian Steps
2A and 2B in SU25?
Answer Posted / heena jain
(10)If you want to reset the password for say 100 users in
Production how will you do?
Ans.Password reset can also be done using LSMW which is more simpler than SECATT.
Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
What are the most used tables in sap?
What is sap internet transaction server?
What is the difference between authorization object and authorization object class?
Can you explain internet-level security?
Explain secure store and forward?
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?
What are se10 t-codes used for?
How to find ECC system, GRC system and BI system ?
Can you explain snc in sap security?
Can you explain network topology in sap systems?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
What does the pfcg_time_dependency clean up?
What is a composite role?
What is the use of Personalization tab in SU01?