All Interview Questions Sap Security

Comment on the necessary steps that need to be taken prior to assigning a task for users even when approval is given from the authorities or the authorized controllers.

There are certain steps that need to be taken prior to handing over or giving SAP_all to any of the users. These steps are necessary even when it has the approval of someone in the position of authority. These pre-requisite includes the following.

  • The first is to enable the log of the audit. This can be done using a transactional code of sm 19.
  • The second step is to retrieve the log of the audit. This can be done by using a transactional code of sm 20.
  • 2 If one wants the display the text of transactional code then which of the table will be used?

    If a person wants to display the text of the transactional code then the TSTCT table will be used.

    4 List out SAP security T-codes?

    The following are a list of frequently used SAP security T-codes:

    SAP T-code Description
    PFGC This T-code is used for maintaining roles.
    SU10 This T-code is used for handling users.
    SU01 This T-code is used for creating the user or changing the user.
    ST01 This T-code is used for tracing the system.
    SU53 This T-code is used for analyzing authorization

    Top 10 SAP Security Interview Questions And Answers

    This gives personal information about which particular authorization checks need execution inside the transaction and which authorization check doesn’t need to be. This table gives information regarding the proposal data of the authorization that includes the data related to an authorization which is useful for transactions
    This table also looks at the checks which are present in the profile generator. It looks at the default set values that need to be present in the profile generator.

    The main role of SAP security is to provide the right access for users with business according to their responsibility and the authority that they hold. And permission is supposed to be given as per their roles in any of the organizations or departments.

    1 Explain what is user buffer?

    Whenever a user logs into the SAP R/3 system, a user buffer is built where it has all the authorizations associated with the user. So basically, each user will have their user buffer.

    For example:

  • If Krishna is a user and tries to log on to the system, then buffer would have all the authorization information under USER_KRISHNA_ROLE.
  • On the other hand, the user would fail to log on to the system, under the below scenarios:
  • For the user, authorization information doesnt exist in the user buffer
  • If the user buffer has many entries and is flooded with authorization information. In this case, the number of entries can be restricted or limited by using a profile parameter called “auth/number_in_userbuffer”.
  • How can one delete numerous roles from Production Systems, DEV, and QA?

    There are certain steps that make it possible to delete numerous roles from the above-mentioned systems. These steps are as follows:

  • Firstly one needs to put the roles that are supposed to be deleted in transport.
  • Secondly, delete the said roles from there.
  • Thirdly one has to send transport across the production and QA.
  • This way one can delete numerous roles.
  • SAP Security Interview Questions and Answers | SAP Security| Freshers|Experienced|

    Related Posts

    Leave a Reply

    Your email address will not be published. Required fields are marked *