SlideShare a Scribd company logo
1. What isreference user type?
Reference usernameused to assigndelegation/tempaccesstoa user
i.e examplea user is going for a holiday during that timeweneed to assign
another employee to take responsibilitytoavoid business impact, sothat
canbe achieved using referenceuser type, You canassigna ref user in roles
tab
2. How do you createan authorizationobject?
Go to SU21 and select authorizationclassand createanauthorizationobject
and maintainauthorizationfieldsand maintainauthoritycheckfor it
3. Is it possible to convert authorizationfieldsintoorganizationfieldsand
what are theexception/restrictionsfor it?
ABAP report PFCG_ORGFIELD_CREATE used to convert authorization
fields into ORG level, similarlyreport PFCG_ORGFIELD_DELETE used to
convert org level field intonon org fields
a. Only createOrganizationallevel fields beforeyou start setting up your
system. If you createorganizationallevel fields later, the authorizationdata
for roles may have to be post processed.
b. Thefields "Activity", "ACTVT"and "Transactioncode", "TCD" cannot
be converted into an organizationallevel field.
Refer: OSS note 323817
4. How do you extract user emailaddress?
USR21 and ADR6 tablesare used to get user email addressin SAP.
Enter the usernamein USR21tcode and executeit, now you will get
“person number” and copy it which users emailaddress required and enter
those person numbersto ADR6 tableand executeit and you will get the
emailaddress
5. How to extract parent and derived role relation?
TableAGR_DEFINE used to check parent and derived role relationship
6. How do you createauthorizationgroups?
SE54 tcodeused to createauthorizationgroupsfor tablesand programs
7. How do you restrict a tableto particularpersonor team?
Createan authorizationgroup for the tablewhich needs to be protected and
add the auth group to S_TABU_DIS auth object filed value and give it
activitieslike, create, delete, display, etc..
8. In which table you will checkauthorizationgroup created for a particular
table?
TBRG tableused to check availableauthorizationgroupsand TBRGT holds
auth group with description
9. What arethe ORG fields in sap?
1. Companycode
2. Controlling area
3. Division
4. Salesorganization
5. Plant
6. Business area
7. Purchasingorganization
8. Credit control area
9. Account type
10. What arestatuslight in authorizationpagefor authorizationfieldsin
PFCG?
1. Red – Org level not maintained
2. Yellow – atleast one filed left open
3. Green – all fields are maintained
11. What isthe differencebetweenR/3 securityand BW security?
R/3 securitymainlybased on transactionand controlled via authorization
objectsusing profiles and roles
BW securityis mainlybased on analysisauthorizationusing RSECADMIN
tcodeand very few tcodescompareto R/3 and we should secureInfo
objects, info cubes, ODS and quires
BW authorizationsareprimarilyfocused on data not on transactioncodes
and divided intotwo mainareasauthorizationfor administratorworkbench
and authorizationfor businessexplorer
Authorizationobjectsfor field level securityin reporting arecreated asand
when needed.
12. Which authorizationobjectgivesend user to execute/view a queryin
BW?
- S_RS_COMP
- S_RS_COMP1
- S_RS_FOLD
13. What isthe use of SU24 tcode?
SU24(checkindicator) holdsthe relationship betweentcodeand
authorizationobjectsincustomer tablesUSOBX_Cand USOBT_C tables
which values are pulled during role creation
SU24 used to maintainallthe objectsthat arechecked during tcode
execution
14. How do you check authorizationcheckfor a tcode?
Check SU24 for authorizationobjectand itsproposalalso we cancheck the
ABAP report as well
15. What is the authorizationobject which givesdeveloper debug
authorization?
S_DEVELOP with activity01, 02 or 03
16. How do you secure/giveaccessto a custom report to users
without giving SE38tcodeaccess?
Createan authorizationgroup for that report to secure it and giveSA38
tcodeauthorizationfor executionofthe custom report or createa custom
transactioncodeand maintainauthoritycheckand assignto users via role.
17. How do you createa custom tcode?
SE93 is the tcodeused to createa custom tcode
18. How do you createa transport request?
SE01, SE09, SE10 tcodesare used to createa transport request and also we
cancreateduring customizationtimelike, PFCG, SE38, BD54, etc..
19. What arethe types of transport requests?
- Custom transport request
- Workbench transport request
- Transport of copies
- Relocation
20. What is the differencebetweencustom and workbench transport
requests?
- Workbench requestsarethose involve changesto cross client
customizing and repositoryobjects, thoseobjectsareindependent of the
client and the requestsareused to transport changed repositoryobjectsand
changed system settingsfrom cross client tables
- Customizing requestsinvolve changesto client dependent objects, so
custom transport request used to copy and transport requeststhat are
client specific
21. How do you schedule a background job
SM36 used to schedule background jobs
22. Have you worked on upgradeand stepsinvolved?
Yes
2A. Comparewith SAP values
2B. Compareaffected transactioncodes
2C. Roles to be checked
2D. Display changed transactioncodes
23. What is expert modein PFCG?
Expert mode in PFCG used to maintainexistingrolesit has following
options
- Delete and recreateauthorizationand profiles
- Edit old status
- Read old statusand mergewith new data
24. Which tableyou cancheckthe relationbetween compositerolesand
child roles?
AGR_AGRS
25. What arethe license types you assignto end users while creating it?
- Applicationprofessionalusers
- Applicationlimited professionalusers
- ApplicationESS user
26. You are not allowed to assignany roles to user profile further what
would be the reason for it?
User must have exceeded the limitationfor profiles assignment i.e312
27. Have you worked with auditors?
Yes with internalauditorsand explainit
28. Which tableused to view roles and org level values?
TableAGR_1252 maintainsrelationship betweenrolesand org field values
29. Which tableused to view roles and authorizationobjectsand itsvalues?
TableAGR_1251maintainsrelationshipbetweenroles, authorization
objectsand its field values
30. Where do you delete old audit logs?
SM18
31. Wheredo you look lock entries?
SM12
32. Which authorizationobject givesyou SM12 authorizationother than
S_tcode?
S_ENQUE
33. Wheredo you reset user buffer?
SU56
34. What is the mandatory field in addresstab in SU01?
Last Name
35. How do you lock a tcode?
SM01tcodeused to lock a tcode
36. Which tablestores all ABAP reports?
TRDIR
37. How do you lock users who didn’t log in to SAP morethan 90 days?
USR02 tableswe canget last login dateand time
38. Which tableholds all valid activityfields?
TACTZ
39. ABAP report which is used for user reconciliation?
PFCG_TIME_DEPENDENCY
40. Tablewhich holds all possible authorizationfieldsas variables
USVAR

More Related Content

What's hot

Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
Siva Pradeep Bolisetti
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
Nasir Gondal
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
techgurusuresh
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
larrymcc
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
grconlinetraining
 
Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security
Bharath Trainings
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
Mart Leepin
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
Anil Kumar
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
suresh
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
Guang Ying Yuan
 
SAP GRC
SAP GRC SAP GRC
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security featuresShazia_Sultana
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
Nasir Gondal
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
Siva Pradeep Bolisetti
 
Authorisations in SAP: best practices
Authorisations in SAP: best practicesAuthorisations in SAP: best practices
Authorisations in SAP: best practices
Jonathan Eemans
 
1000 solved questions
1000 solved questions1000 solved questions
1000 solved questionsKranthi Kumar
 

What's hot (20)

Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security Derived master roles Configuration screenshots in SAP Security
Derived master roles Configuration screenshots in SAP Security
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
Authorisations in SAP: best practices
Authorisations in SAP: best practicesAuthorisations in SAP: best practices
Authorisations in SAP: best practices
 
1000 solved questions
1000 solved questions1000 solved questions
1000 solved questions
 

Similar to SAP Security interview questions

CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxCMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
mary772
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET Journal
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
CSI tools
 
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docxBoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
jasoninnes20
 
Software Requirements
Software RequirementsSoftware Requirements
Software RequirementsBala Ganesh
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
Vision Concepts Infrastructure Services Solution
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET Journal
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specifications
kylan2
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docx
Moorthy Esakky
 
SRS.pdf
SRS.pdfSRS.pdf
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
Ehsan Elahi
 
Software requirement specification(SRS)
Software requirement specification(SRS)Software requirement specification(SRS)
Software requirement specification(SRS)
Mohammad Emrul Hassan Emon
 
Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1
hani2253
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Projecthani2253
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
IRJET Journal
 
Day01 01 software requirement concepts
Day01 01 software requirement conceptsDay01 01 software requirement concepts
Day01 01 software requirement concepts
Namtướcbóngđêm Virut
 
Future fashion report
Future fashion reportFuture fashion report
Future fashion report
lokeshboran
 
Ch 1-Introduction.ppt
Ch 1-Introduction.pptCh 1-Introduction.ppt
Ch 1-Introduction.ppt
balewayalew
 
27 pso business_requirements
27 pso business_requirements27 pso business_requirements
27 pso business_requirements
Marcelo Mesti
 

Similar to SAP Security interview questions (20)

CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docxCMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
CMGT410 v19Business Requirements TemplateCMGT410 v19Page 2.docx
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
 
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docxBoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
BoardSprintUser Story ScenarioDesignDevelopmentTestUAT Release1U .docx
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specifications
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docx
 
BikramSamaddar
BikramSamaddarBikramSamaddar
BikramSamaddar
 
SRS.pdf
SRS.pdfSRS.pdf
SRS.pdf
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Software requirement specification(SRS)
Software requirement specification(SRS)Software requirement specification(SRS)
Software requirement specification(SRS)
 
Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
Day01 01 software requirement concepts
Day01 01 software requirement conceptsDay01 01 software requirement concepts
Day01 01 software requirement concepts
 
Future fashion report
Future fashion reportFuture fashion report
Future fashion report
 
Ch 1-Introduction.ppt
Ch 1-Introduction.pptCh 1-Introduction.ppt
Ch 1-Introduction.ppt
 
27 pso business_requirements
27 pso business_requirements27 pso business_requirements
27 pso business_requirements
 

More from Siva Pradeep Bolisetti

Cua setup procedure SAP security
Cua setup procedure SAP securityCua setup procedure SAP security
Cua setup procedure SAP security
Siva Pradeep Bolisetti
 
Step by step exercise for bw 365
Step by step exercise for bw 365Step by step exercise for bw 365
Step by step exercise for bw 365
Siva Pradeep Bolisetti
 
Solar refrigeration system
Solar refrigeration system Solar refrigeration system
Solar refrigeration system
Siva Pradeep Bolisetti
 
Use of network scheduling technique
Use of network scheduling technique Use of network scheduling technique
Use of network scheduling technique
Siva Pradeep Bolisetti
 
Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...
Siva Pradeep Bolisetti
 
Sappress sap governance risk and compliance
Sappress sap governance risk and complianceSappress sap governance risk and compliance
Sappress sap governance risk and compliance
Siva Pradeep Bolisetti
 
How to improve user experience via roles
How to improve user experience via rolesHow to improve user experience via roles
How to improve user experience via roles
Siva Pradeep Bolisetti
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Bearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELBearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELSiva Pradeep Bolisetti
 

More from Siva Pradeep Bolisetti (10)

Cua setup procedure SAP security
Cua setup procedure SAP securityCua setup procedure SAP security
Cua setup procedure SAP security
 
Step by step exercise for bw 365
Step by step exercise for bw 365Step by step exercise for bw 365
Step by step exercise for bw 365
 
Solar refrigeration system
Solar refrigeration system Solar refrigeration system
Solar refrigeration system
 
Welding and types
Welding and types Welding and types
Welding and types
 
Use of network scheduling technique
Use of network scheduling technique Use of network scheduling technique
Use of network scheduling technique
 
Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...Calculation of optimum cost of transportation of goods from godowns to differ...
Calculation of optimum cost of transportation of goods from godowns to differ...
 
Sappress sap governance risk and compliance
Sappress sap governance risk and complianceSappress sap governance risk and compliance
Sappress sap governance risk and compliance
 
How to improve user experience via roles
How to improve user experience via rolesHow to improve user experience via roles
How to improve user experience via roles
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHELBearing design for Turbo Generator- Internship at BHEL
Bearing design for Turbo Generator- Internship at BHEL
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

SAP Security interview questions

  • 1. 1. What isreference user type? Reference usernameused to assigndelegation/tempaccesstoa user i.e examplea user is going for a holiday during that timeweneed to assign another employee to take responsibilitytoavoid business impact, sothat canbe achieved using referenceuser type, You canassigna ref user in roles tab 2. How do you createan authorizationobject? Go to SU21 and select authorizationclassand createanauthorizationobject and maintainauthorizationfieldsand maintainauthoritycheckfor it 3. Is it possible to convert authorizationfieldsintoorganizationfieldsand what are theexception/restrictionsfor it? ABAP report PFCG_ORGFIELD_CREATE used to convert authorization fields into ORG level, similarlyreport PFCG_ORGFIELD_DELETE used to convert org level field intonon org fields a. Only createOrganizationallevel fields beforeyou start setting up your system. If you createorganizationallevel fields later, the authorizationdata for roles may have to be post processed. b. Thefields "Activity", "ACTVT"and "Transactioncode", "TCD" cannot be converted into an organizationallevel field. Refer: OSS note 323817 4. How do you extract user emailaddress? USR21 and ADR6 tablesare used to get user email addressin SAP. Enter the usernamein USR21tcode and executeit, now you will get “person number” and copy it which users emailaddress required and enter those person numbersto ADR6 tableand executeit and you will get the emailaddress 5. How to extract parent and derived role relation? TableAGR_DEFINE used to check parent and derived role relationship 6. How do you createauthorizationgroups? SE54 tcodeused to createauthorizationgroupsfor tablesand programs 7. How do you restrict a tableto particularpersonor team?
  • 2. Createan authorizationgroup for the tablewhich needs to be protected and add the auth group to S_TABU_DIS auth object filed value and give it activitieslike, create, delete, display, etc.. 8. In which table you will checkauthorizationgroup created for a particular table? TBRG tableused to check availableauthorizationgroupsand TBRGT holds auth group with description 9. What arethe ORG fields in sap? 1. Companycode 2. Controlling area 3. Division 4. Salesorganization 5. Plant 6. Business area 7. Purchasingorganization 8. Credit control area 9. Account type 10. What arestatuslight in authorizationpagefor authorizationfieldsin PFCG? 1. Red – Org level not maintained 2. Yellow – atleast one filed left open 3. Green – all fields are maintained 11. What isthe differencebetweenR/3 securityand BW security? R/3 securitymainlybased on transactionand controlled via authorization
  • 3. objectsusing profiles and roles BW securityis mainlybased on analysisauthorizationusing RSECADMIN tcodeand very few tcodescompareto R/3 and we should secureInfo objects, info cubes, ODS and quires BW authorizationsareprimarilyfocused on data not on transactioncodes and divided intotwo mainareasauthorizationfor administratorworkbench and authorizationfor businessexplorer Authorizationobjectsfor field level securityin reporting arecreated asand when needed. 12. Which authorizationobjectgivesend user to execute/view a queryin BW? - S_RS_COMP - S_RS_COMP1 - S_RS_FOLD 13. What isthe use of SU24 tcode? SU24(checkindicator) holdsthe relationship betweentcodeand authorizationobjectsincustomer tablesUSOBX_Cand USOBT_C tables which values are pulled during role creation SU24 used to maintainallthe objectsthat arechecked during tcode execution 14. How do you check authorizationcheckfor a tcode? Check SU24 for authorizationobjectand itsproposalalso we cancheck the ABAP report as well 15. What is the authorizationobject which givesdeveloper debug authorization? S_DEVELOP with activity01, 02 or 03 16. How do you secure/giveaccessto a custom report to users without giving SE38tcodeaccess? Createan authorizationgroup for that report to secure it and giveSA38 tcodeauthorizationfor executionofthe custom report or createa custom transactioncodeand maintainauthoritycheckand assignto users via role. 17. How do you createa custom tcode? SE93 is the tcodeused to createa custom tcode
  • 4. 18. How do you createa transport request? SE01, SE09, SE10 tcodesare used to createa transport request and also we cancreateduring customizationtimelike, PFCG, SE38, BD54, etc.. 19. What arethe types of transport requests? - Custom transport request - Workbench transport request - Transport of copies - Relocation 20. What is the differencebetweencustom and workbench transport requests? - Workbench requestsarethose involve changesto cross client customizing and repositoryobjects, thoseobjectsareindependent of the client and the requestsareused to transport changed repositoryobjectsand changed system settingsfrom cross client tables - Customizing requestsinvolve changesto client dependent objects, so custom transport request used to copy and transport requeststhat are client specific 21. How do you schedule a background job SM36 used to schedule background jobs 22. Have you worked on upgradeand stepsinvolved? Yes 2A. Comparewith SAP values 2B. Compareaffected transactioncodes 2C. Roles to be checked 2D. Display changed transactioncodes 23. What is expert modein PFCG? Expert mode in PFCG used to maintainexistingrolesit has following options - Delete and recreateauthorizationand profiles - Edit old status - Read old statusand mergewith new data 24. Which tableyou cancheckthe relationbetween compositerolesand
  • 5. child roles? AGR_AGRS 25. What arethe license types you assignto end users while creating it? - Applicationprofessionalusers - Applicationlimited professionalusers - ApplicationESS user 26. You are not allowed to assignany roles to user profile further what would be the reason for it? User must have exceeded the limitationfor profiles assignment i.e312 27. Have you worked with auditors? Yes with internalauditorsand explainit 28. Which tableused to view roles and org level values? TableAGR_1252 maintainsrelationship betweenrolesand org field values 29. Which tableused to view roles and authorizationobjectsand itsvalues? TableAGR_1251maintainsrelationshipbetweenroles, authorization objectsand its field values 30. Where do you delete old audit logs? SM18 31. Wheredo you look lock entries? SM12 32. Which authorizationobject givesyou SM12 authorizationother than S_tcode? S_ENQUE 33. Wheredo you reset user buffer? SU56 34. What is the mandatory field in addresstab in SU01? Last Name 35. How do you lock a tcode? SM01tcodeused to lock a tcode
  • 6. 36. Which tablestores all ABAP reports? TRDIR 37. How do you lock users who didn’t log in to SAP morethan 90 days? USR02 tableswe canget last login dateand time 38. Which tableholds all valid activityfields? TACTZ 39. ABAP report which is used for user reconciliation? PFCG_TIME_DEPENDENCY 40. Tablewhich holds all possible authorizationfieldsas variables USVAR