SlideShare a Scribd company logo
1 of 18
SAP Security Interview Question & Answers
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
1. Explain what is SAP security?
SAP security is delivering correct entry to trade customers with admire to
their authority or responsibility and giving permission in keeping with their
roles.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
2. Explain what is “roles” in SAP security?
“Roles” is noted a gaggle of t-codes, which is assigned to execute targeted
industry undertaking. Each position in SAP requires exact privileges to
execute a function in SAP that is called AUTHORIZATIONS.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
3. Explain how you can lock all the users at a time in SAP?
Through executing EWZ5 t-code in SAP, all the consumer may
also be locked at the same time in SAP.
SAP Security T-codes:
Frequently used security T-codes
1. SU01 - Create/ Change User
2. SU01 Create/ Change User PFCG - Maintain Roles
3. SU10 - Mass Changes
4. SU01D - Display User
5. SUIM - ReportsST01 – Trace
6. SU53 - Authorization analysis
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
4. How to create users?
Execute transaction SU01 and fill in all the discipline. When
growing a new consumer, you have to enter aninitial password for
that consumer on the Logon data tab. All other knowledge is
optional.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
5. Explain what is authorization object and authorization object class?
Authorization Object: Authorization objects are agencies of authorization subject
that regulates detailed activity. Authorization pertains to a detailed motion whilst
Authorization subject relates for protection directors to configure specific values
in that designated action.
Authorization object class: Authorization object falls under authorization object
courses, and they're grouped by using function area like HR, finance, accounting,
and so on.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
6. Explain how you can delete multiple roles from QA, DEV and
Production System?
To delete multiple roles from QA, DEV and production system, you need to
comply with beneath steps
• Situation the roles to be deleted in a transport (in dev)
• Delete the roles
• Push the transport by way of to QA and creation
This will delete all the all roles
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
7. Explain what things you have to take care before executing Run
System Trace?
If you are tracing batch person identification or CPIC, then earlier than
executing the Run approach hint, you need to ensure that the identity
will have to had been assigned to SAP_ALL and SAP_NEW. It enables
the user to execute the job with none authorization verify failure.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
8. Mention what is the difference between USOBT_C and USOBX_C?
USOBT_C: This table consists the authorization proposal data which
contains the authorization data which are relevant for a transaction
USOBX_C: It tells which authorization check are to be executed within a
transaction and which must not.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
9. What is the t-code used for locking the transaction from
execution?
For locking the transaction from execution t-code SM01, is used.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
10. Mention what is the main difference between the derived role and a single
role?
For the only position, we are able to add or delete the t-codes even as for a
derived role you can't do that.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
11. Mention what is the maximum number of profiles in a role and
maximum number of object in a role?
Maximum number of profiles in a role is 312, and maximum number of
object in a role is 150.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
12. Explain what is SOD in SAP Security?
SOD way Segregation of obligations; it's applied in SAP with a view
to detect and avert error or fraud during the business transaction.
For example, if a person or employee has the privilege to access bank
account detail and cost run, it maybe viable that it will possibly divert
vendor payments to his own account.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
13. How do you create usernames in SAP?
Goto transaction SU01 and creating a new username, you must enter
an initial password for that user on the Logon data tab and last name
in address tab
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
14. List R/3 User Types ?
1. Dialog - customers are used for character user. Examine for expired/initial
passwords possible to change your own password. Verify for a couple of
dialog logon
2. carrier person - handiest person directors can change the password. No
investigate for expired/initial passwords. Multiple logon accredited
3. process - customers are usually not able of interaction and are used to
participate in detailed procedure routine, similar to historical past
processing, ALE, Workflow, etc.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
4. Reference - person is, like a system consumer, a common, non-for my
part associated, consumer. Further authorizations may also be assigned
inside the system making use of a reference person. A reference user for
further rights can be assigned for every person within the Roles tab.
5. communiqué information – GUI logon not viable and and investigate for
expired/initial passwords and its used for RFC connections
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
15. What is a derived role?
Derived roles consult with roles that already exist. The derived roles inherit
the menu constitution and the capabilities included (transactions,
experiences, web links, and so forth) from the position referenced. A role can
only inherit menus and services if no transaction codes were assigned to it
before.
The larger-degree function passes on its authorizations to the derived
position as default values which can also be modified afterwards.
Organizational level definitions will not be handed on. They need to be
created anew in the inheriting position. Consumer assignments usually are
not passed on both.
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com
Thank You
For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com

More Related Content

What's hot

T codes sap-basis-training
T codes sap-basis-trainingT codes sap-basis-training
T codes sap-basis-training
munnasap007
 
100 sap basis_interviwe_questions
100 sap basis_interviwe_questions100 sap basis_interviwe_questions
100 sap basis_interviwe_questions
bhaskarbi
 

What's hot (20)

Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
T codes sap-basis-training
T codes sap-basis-trainingT codes sap-basis-training
T codes sap-basis-training
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
How to analyzing sap critical authorizations
How to analyzing sap critical authorizationsHow to analyzing sap critical authorizations
How to analyzing sap critical authorizations
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
100 sap basis_interviwe_questions
100 sap basis_interviwe_questions100 sap basis_interviwe_questions
100 sap basis_interviwe_questions
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security
 
SAP ABAP OVERVIEW
SAP ABAP OVERVIEWSAP ABAP OVERVIEW
SAP ABAP OVERVIEW
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
Sap basis-training-material
Sap basis-training-materialSap basis-training-material
Sap basis-training-material
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Exclusive SAP Basis Training Book | www.sapdocs.info
Exclusive SAP Basis Training Book | www.sapdocs.infoExclusive SAP Basis Training Book | www.sapdocs.info
Exclusive SAP Basis Training Book | www.sapdocs.info
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
SAP Basis Training Material | www.sapdocs.info
SAP Basis Training Material | www.sapdocs.infoSAP Basis Training Material | www.sapdocs.info
SAP Basis Training Material | www.sapdocs.info
 

Viewers also liked

Ritesh_Resume_SAP_Basis_Consultant
Ritesh_Resume_SAP_Basis_ConsultantRitesh_Resume_SAP_Basis_Consultant
Ritesh_Resume_SAP_Basis_Consultant
ritesh paul garg
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-procedures
narendar99
 
Information Security Fundamentals External Workforce (NH)
Information Security Fundamentals External Workforce (NH)Information Security Fundamentals External Workforce (NH)
Information Security Fundamentals External Workforce (NH)
Tijana Otasevic
 
Mubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr Exp
Mubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr ExpMubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr Exp
Mubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr Exp
Mubashir Ahmed
 
Rohit Vashishtha - SAP EP & NetWeaver Consultant
Rohit Vashishtha - SAP EP & NetWeaver ConsultantRohit Vashishtha - SAP EP & NetWeaver Consultant
Rohit Vashishtha - SAP EP & NetWeaver Consultant
Rohit Vashishtha
 

Viewers also liked (13)

Ritesh_Resume_SAP_Basis_Consultant
Ritesh_Resume_SAP_Basis_ConsultantRitesh_Resume_SAP_Basis_Consultant
Ritesh_Resume_SAP_Basis_Consultant
 
Sap basis
Sap basisSap basis
Sap basis
 
SAP Certified Basis Monitoring Tool
SAP Certified Basis Monitoring Tool SAP Certified Basis Monitoring Tool
SAP Certified Basis Monitoring Tool
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-procedures
 
Information Security Fundamentals External Workforce (NH)
Information Security Fundamentals External Workforce (NH)Information Security Fundamentals External Workforce (NH)
Information Security Fundamentals External Workforce (NH)
 
SAP Interview Tips
SAP Interview TipsSAP Interview Tips
SAP Interview Tips
 
sap basis
sap basissap basis
sap basis
 
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by KeylabsSAP BASIS ONLINE TRAINING MATERIAL by Keylabs
SAP BASIS ONLINE TRAINING MATERIAL by Keylabs
 
Sap solution manager
Sap solution managerSap solution manager
Sap solution manager
 
Mubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr Exp
Mubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr ExpMubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr Exp
Mubashir Ahmed ERP SAP Basis Consultant Resume with 3 Yr Exp
 
Sap basis r3 hand book
Sap basis r3 hand bookSap basis r3 hand book
Sap basis r3 hand book
 
Sap basis made easy
Sap basis made easySap basis made easy
Sap basis made easy
 
Rohit Vashishtha - SAP EP & NetWeaver Consultant
Rohit Vashishtha - SAP EP & NetWeaver ConsultantRohit Vashishtha - SAP EP & NetWeaver Consultant
Rohit Vashishtha - SAP EP & NetWeaver Consultant
 

Similar to Sap security interview question & answers

Hr structural auths
Hr   structural authsHr   structural auths
Hr structural auths
hkodali
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
Salesforce Developers
 

Similar to Sap security interview question & answers (20)

Pentaho interview question and answers
Pentaho interview question and answersPentaho interview question and answers
Pentaho interview question and answers
 
Hr structural auths
Hr   structural authsHr   structural auths
Hr structural auths
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
 
OpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for BeginnersOpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for Beginners
 
Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?
 
Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process Agility
 
Whitepaper: Continuous Compliance in SAP Environments - Happiest Minds
Whitepaper: Continuous Compliance in SAP Environments - Happiest MindsWhitepaper: Continuous Compliance in SAP Environments - Happiest Minds
Whitepaper: Continuous Compliance in SAP Environments - Happiest Minds
 
Continuous Compliance-in-Sap-Environments
Continuous Compliance-in-Sap-EnvironmentsContinuous Compliance-in-Sap-Environments
Continuous Compliance-in-Sap-Environments
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
Sap mm interview questions and answers
Sap mm interview questions and answersSap mm interview questions and answers
Sap mm interview questions and answers
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
SAP SECURITY ONLINE TRAINING
SAP SECURITY ONLINE TRAININGSAP SECURITY ONLINE TRAINING
SAP SECURITY ONLINE TRAINING
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Driving Business Applications with Real-Time Data
Driving Business Applications with Real-Time DataDriving Business Applications with Real-Time Data
Driving Business Applications with Real-Time Data
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Soa Test Methodology
Soa Test MethodologySoa Test Methodology
Soa Test Methodology
 
Lean JAD = Agile
Lean JAD = AgileLean JAD = Agile
Lean JAD = Agile
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Sap security interview question & answers

  • 1. SAP Security Interview Question & Answers For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 2. 1. Explain what is SAP security? SAP security is delivering correct entry to trade customers with admire to their authority or responsibility and giving permission in keeping with their roles. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 3. 2. Explain what is “roles” in SAP security? “Roles” is noted a gaggle of t-codes, which is assigned to execute targeted industry undertaking. Each position in SAP requires exact privileges to execute a function in SAP that is called AUTHORIZATIONS. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 4. 3. Explain how you can lock all the users at a time in SAP? Through executing EWZ5 t-code in SAP, all the consumer may also be locked at the same time in SAP. SAP Security T-codes: Frequently used security T-codes 1. SU01 - Create/ Change User 2. SU01 Create/ Change User PFCG - Maintain Roles 3. SU10 - Mass Changes 4. SU01D - Display User 5. SUIM - ReportsST01 – Trace 6. SU53 - Authorization analysis For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 5. 4. How to create users? Execute transaction SU01 and fill in all the discipline. When growing a new consumer, you have to enter aninitial password for that consumer on the Logon data tab. All other knowledge is optional. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 6. 5. Explain what is authorization object and authorization object class? Authorization Object: Authorization objects are agencies of authorization subject that regulates detailed activity. Authorization pertains to a detailed motion whilst Authorization subject relates for protection directors to configure specific values in that designated action. Authorization object class: Authorization object falls under authorization object courses, and they're grouped by using function area like HR, finance, accounting, and so on. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 7. 6. Explain how you can delete multiple roles from QA, DEV and Production System? To delete multiple roles from QA, DEV and production system, you need to comply with beneath steps • Situation the roles to be deleted in a transport (in dev) • Delete the roles • Push the transport by way of to QA and creation This will delete all the all roles For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 8. 7. Explain what things you have to take care before executing Run System Trace? If you are tracing batch person identification or CPIC, then earlier than executing the Run approach hint, you need to ensure that the identity will have to had been assigned to SAP_ALL and SAP_NEW. It enables the user to execute the job with none authorization verify failure. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 9. 8. Mention what is the difference between USOBT_C and USOBX_C? USOBT_C: This table consists the authorization proposal data which contains the authorization data which are relevant for a transaction USOBX_C: It tells which authorization check are to be executed within a transaction and which must not. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 10. 9. What is the t-code used for locking the transaction from execution? For locking the transaction from execution t-code SM01, is used. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 11. 10. Mention what is the main difference between the derived role and a single role? For the only position, we are able to add or delete the t-codes even as for a derived role you can't do that. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 12. 11. Mention what is the maximum number of profiles in a role and maximum number of object in a role? Maximum number of profiles in a role is 312, and maximum number of object in a role is 150. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 13. 12. Explain what is SOD in SAP Security? SOD way Segregation of obligations; it's applied in SAP with a view to detect and avert error or fraud during the business transaction. For example, if a person or employee has the privilege to access bank account detail and cost run, it maybe viable that it will possibly divert vendor payments to his own account. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 14. 13. How do you create usernames in SAP? Goto transaction SU01 and creating a new username, you must enter an initial password for that user on the Logon data tab and last name in address tab For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 15. 14. List R/3 User Types ? 1. Dialog - customers are used for character user. Examine for expired/initial passwords possible to change your own password. Verify for a couple of dialog logon 2. carrier person - handiest person directors can change the password. No investigate for expired/initial passwords. Multiple logon accredited 3. process - customers are usually not able of interaction and are used to participate in detailed procedure routine, similar to historical past processing, ALE, Workflow, etc. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 16. 4. Reference - person is, like a system consumer, a common, non-for my part associated, consumer. Further authorizations may also be assigned inside the system making use of a reference person. A reference user for further rights can be assigned for every person within the Roles tab. 5. communiqué information – GUI logon not viable and and investigate for expired/initial passwords and its used for RFC connections For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 17. 15. What is a derived role? Derived roles consult with roles that already exist. The derived roles inherit the menu constitution and the capabilities included (transactions, experiences, web links, and so forth) from the position referenced. A role can only inherit menus and services if no transaction codes were assigned to it before. The larger-degree function passes on its authorizations to the derived position as default values which can also be modified afterwards. Organizational level definitions will not be handed on. They need to be created anew in the inheriting position. Consumer assignments usually are not passed on both. For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com
  • 18. Thank You For Free Demo Contact PH : (720)463-3800 For Details : best-online-training.com