Comment on the necessary steps that need to be taken prior to assigning a task for users even when approval is given from the authorities or the authorized controllers.
There are certain steps that need to be taken prior to handing over or giving SAP_all to any of the users. These steps are necessary even when it has the approval of someone in the position of authority. These pre-requisite includes the following.
2 If one wants the display the text of transactional code then which of the table will be used?
If a person wants to display the text of the transactional code then the TSTCT table will be used.
4 List out SAP security T-codes?
The following are a list of frequently used SAP security T-codes:
SAP T-code | Description |
PFGC | This T-code is used for maintaining roles. |
SU10 | This T-code is used for handling users. |
SU01 | This T-code is used for creating the user or changing the user. |
ST01 | This T-code is used for tracing the system. |
SU53 | This T-code is used for analyzing authorization |
Top 10 SAP Security Interview Questions And Answers
USOBX_C | USOBT_C |
This gives personal information about which particular authorization checks need execution inside the transaction and which authorization check doesn’t need to be. | This table gives information regarding the proposal data of the authorization that includes the data related to an authorization which is useful for transactions |
This table also looks at the checks which are present in the profile generator. | It looks at the default set values that need to be present in the profile generator. |
The main role of SAP security is to provide the right access for users with business according to their responsibility and the authority that they hold. And permission is supposed to be given as per their roles in any of the organizations or departments.
1 Explain what is user buffer?
Whenever a user logs into the SAP R/3 system, a user buffer is built where it has all the authorizations associated with the user. So basically, each user will have their user buffer.
For example:
How can one delete numerous roles from Production Systems, DEV, and QA?
There are certain steps that make it possible to delete numerous roles from the above-mentioned systems. These steps are as follows: