Sap security interview question & answersNancy Nelida
We are Providing SAP Security Online Training with real time project based training and interview question & Answers by 12+ professional trainers to the people in US, UK and Worldwide.
Sap security interview question & answersNancy Nelida
We are Providing SAP Security Online Training with real time project based training and interview question & Answers by 12+ professional trainers to the people in US, UK and Worldwide.
SAP GRC online Training on Access Control , which includes all the four components Access Risk Analysis( ARA), Emergency Access Management ( EAM), Access Request Management(ARM), Business Role Management( BRM).
GRC 12 online training
SAP GRC 10 Online Training
Derived master roles Configuration screenshots in SAP Security Bharath Trainings
This Screen Shots as been created by one of the student who got trained from us(BharathTrainings),Hope This might help the new Aspirants while practicing the SAP Security Configurations.
Software AG was top ranked in current offering and received among the highest scores in the strategy category in the Forrester Wave. webMethods Hybrid Integration Platform combines traditional on-premise integration with cloud integration capabilities to support a wide range of integration patterns for the modern digital enterprise.
Kellton Tech’s Digital Connected Enterprise (DCE) is a leader in enterprise-level integration, API management and multi-speed IT strategy, leveraging Software AG’s Digital Business Platform Kellton Tech empowers world’s best-known brands to effectively use Software AG’s Digital Business Platform to innovate, differentiate and win in the digital world.
In this session, we will discuss
- Details about webMethods 9.12 release
- Significant features and enhancements in webMethods 9.12
- Kellton Tech’s upgrade methodology and modernization offering
CMGT/410 v19
Business Requirements Template
CMGT/410 v19
Page 2 of 14Business Requirements TemplateHow to Use This Document
This document is a template for creating a Business Requirements Document (BRD); it includes instructions and examples for guidance. As you complete your BRD using the template, only include sections pertinent to your project.Table of Contents
How to Use This Document1
Table of Contents1
1.Executive Summary2
1.1Project Overview2
1.2Purpose and Scope of this Specification2
2.Product/Service Description3
2.1Product Context3
2.2User Characteristics3
2.3Assumptions3
2.4Constraints3
2.5Dependencies3
3.Requirements4
3.1Functional Requirements4
3.2User Interface Requirements5
3.3Usability5
3.4Performance6
3.4.1Capacity6
3.4.2Availability6
3.4.3Latency6
3.5Manageability/Maintainability6
3.5.1Monitoring6
3.5.2Maintenance6
3.5.3Operations7
3.6System Interface/Integration7
3.6.1Network and Hardware Interfaces7
3.6.2Systems Interfaces7
3.7Security8
3.7.1Protection8
3.7.2Authorization and Authentication8
3.8Data Management8
3.9Standards Compliance9
3.10 Portability9
4.User Scenarios/Use Cases9
5.Deleted or Deferred Requirements9
6.Requirements Confirmation/Stakeholder Sign-Off10
Appendices11
Appendix A: Definitions, Acronyms, and Abbreviations11
Appendix B: References11
Appendix C: Requirements Traceability Matrix12
Appendix D: Organizing the Requirements131. Executive Summary
1.1 Project Overview
Describe this project or product and its intended audiences, or provide a link or reference to the project charter.
1.2 Purpose and Scope of this Specification
Describe the purpose of this specification and its intended audience. Include a description of what is within the scope what is outside of the scope of these specifications.
Example:
In Scope
This document addresses requirements related to Phase 2 of Project A:
· Modification of Classification Processing to meet legislative mandate ABC
· Modification of Labor Relations Processing to meet legislative mandate ABC
Out of Scope
The following items in Phase 3 of Project A are out of scope:
· Modification of Classification Processing to meet legislative mandate XYZ
· Modification of Labor Relations Processing to meet legislative mandate XYZ
(Phase 3 will be considered in the development of the requirements for Phase 2, but the Phase 3 requirements will be documented separately.)2. Product/Service Description
In this section, describe the general factors that affect the product and its requirements. This section should contain background information, not state specific requirements (provide the reasons why certain specific requirements are later specified).
2.1 Product Context
How does this product relate to other products? Is it independent and self-contained? Does it interface with a variety of related systems? Describe these relationships or use a diagram to show the major components of the larger system, interconnections, and external interfaces.
2.2 User Characteristics
Create gen.
SAP GRC online Training on Access Control , which includes all the four components Access Risk Analysis( ARA), Emergency Access Management ( EAM), Access Request Management(ARM), Business Role Management( BRM).
GRC 12 online training
SAP GRC 10 Online Training
Derived master roles Configuration screenshots in SAP Security Bharath Trainings
This Screen Shots as been created by one of the student who got trained from us(BharathTrainings),Hope This might help the new Aspirants while practicing the SAP Security Configurations.
Software AG was top ranked in current offering and received among the highest scores in the strategy category in the Forrester Wave. webMethods Hybrid Integration Platform combines traditional on-premise integration with cloud integration capabilities to support a wide range of integration patterns for the modern digital enterprise.
Kellton Tech’s Digital Connected Enterprise (DCE) is a leader in enterprise-level integration, API management and multi-speed IT strategy, leveraging Software AG’s Digital Business Platform Kellton Tech empowers world’s best-known brands to effectively use Software AG’s Digital Business Platform to innovate, differentiate and win in the digital world.
In this session, we will discuss
- Details about webMethods 9.12 release
- Significant features and enhancements in webMethods 9.12
- Kellton Tech’s upgrade methodology and modernization offering
CMGT/410 v19
Business Requirements Template
CMGT/410 v19
Page 2 of 14Business Requirements TemplateHow to Use This Document
This document is a template for creating a Business Requirements Document (BRD); it includes instructions and examples for guidance. As you complete your BRD using the template, only include sections pertinent to your project.Table of Contents
How to Use This Document1
Table of Contents1
1.Executive Summary2
1.1Project Overview2
1.2Purpose and Scope of this Specification2
2.Product/Service Description3
2.1Product Context3
2.2User Characteristics3
2.3Assumptions3
2.4Constraints3
2.5Dependencies3
3.Requirements4
3.1Functional Requirements4
3.2User Interface Requirements5
3.3Usability5
3.4Performance6
3.4.1Capacity6
3.4.2Availability6
3.4.3Latency6
3.5Manageability/Maintainability6
3.5.1Monitoring6
3.5.2Maintenance6
3.5.3Operations7
3.6System Interface/Integration7
3.6.1Network and Hardware Interfaces7
3.6.2Systems Interfaces7
3.7Security8
3.7.1Protection8
3.7.2Authorization and Authentication8
3.8Data Management8
3.9Standards Compliance9
3.10 Portability9
4.User Scenarios/Use Cases9
5.Deleted or Deferred Requirements9
6.Requirements Confirmation/Stakeholder Sign-Off10
Appendices11
Appendix A: Definitions, Acronyms, and Abbreviations11
Appendix B: References11
Appendix C: Requirements Traceability Matrix12
Appendix D: Organizing the Requirements131. Executive Summary
1.1 Project Overview
Describe this project or product and its intended audiences, or provide a link or reference to the project charter.
1.2 Purpose and Scope of this Specification
Describe the purpose of this specification and its intended audience. Include a description of what is within the scope what is outside of the scope of these specifications.
Example:
In Scope
This document addresses requirements related to Phase 2 of Project A:
· Modification of Classification Processing to meet legislative mandate ABC
· Modification of Labor Relations Processing to meet legislative mandate ABC
Out of Scope
The following items in Phase 3 of Project A are out of scope:
· Modification of Classification Processing to meet legislative mandate XYZ
· Modification of Labor Relations Processing to meet legislative mandate XYZ
(Phase 3 will be considered in the development of the requirements for Phase 2, but the Phase 3 requirements will be documented separately.)2. Product/Service Description
In this section, describe the general factors that affect the product and its requirements. This section should contain background information, not state specific requirements (provide the reasons why certain specific requirements are later specified).
2.1 Product Context
How does this product relate to other products? Is it independent and self-contained? Does it interface with a variety of related systems? Describe these relationships or use a diagram to show the major components of the larger system, interconnections, and external interfaces.
2.2 User Characteristics
Create gen.
CSI Authorization Auditor® 2014 is the audit & monitoring application of authorization and role setup in SAP environments. It makes a snapshot of a SAP system to gain an insight into the past or current authorization setup of the SAP system.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
SAP Security interview questions
1. 1. What isreference user type?
Reference usernameused to assigndelegation/tempaccesstoa user
i.e examplea user is going for a holiday during that timeweneed to assign
another employee to take responsibilitytoavoid business impact, sothat
canbe achieved using referenceuser type, You canassigna ref user in roles
tab
2. How do you createan authorizationobject?
Go to SU21 and select authorizationclassand createanauthorizationobject
and maintainauthorizationfieldsand maintainauthoritycheckfor it
3. Is it possible to convert authorizationfieldsintoorganizationfieldsand
what are theexception/restrictionsfor it?
ABAP report PFCG_ORGFIELD_CREATE used to convert authorization
fields into ORG level, similarlyreport PFCG_ORGFIELD_DELETE used to
convert org level field intonon org fields
a. Only createOrganizationallevel fields beforeyou start setting up your
system. If you createorganizationallevel fields later, the authorizationdata
for roles may have to be post processed.
b. Thefields "Activity", "ACTVT"and "Transactioncode", "TCD" cannot
be converted into an organizationallevel field.
Refer: OSS note 323817
4. How do you extract user emailaddress?
USR21 and ADR6 tablesare used to get user email addressin SAP.
Enter the usernamein USR21tcode and executeit, now you will get
“person number” and copy it which users emailaddress required and enter
those person numbersto ADR6 tableand executeit and you will get the
emailaddress
5. How to extract parent and derived role relation?
TableAGR_DEFINE used to check parent and derived role relationship
6. How do you createauthorizationgroups?
SE54 tcodeused to createauthorizationgroupsfor tablesand programs
7. How do you restrict a tableto particularpersonor team?
2. Createan authorizationgroup for the tablewhich needs to be protected and
add the auth group to S_TABU_DIS auth object filed value and give it
activitieslike, create, delete, display, etc..
8. In which table you will checkauthorizationgroup created for a particular
table?
TBRG tableused to check availableauthorizationgroupsand TBRGT holds
auth group with description
9. What arethe ORG fields in sap?
1. Companycode
2. Controlling area
3. Division
4. Salesorganization
5. Plant
6. Business area
7. Purchasingorganization
8. Credit control area
9. Account type
10. What arestatuslight in authorizationpagefor authorizationfieldsin
PFCG?
1. Red – Org level not maintained
2. Yellow – atleast one filed left open
3. Green – all fields are maintained
11. What isthe differencebetweenR/3 securityand BW security?
R/3 securitymainlybased on transactionand controlled via authorization
3. objectsusing profiles and roles
BW securityis mainlybased on analysisauthorizationusing RSECADMIN
tcodeand very few tcodescompareto R/3 and we should secureInfo
objects, info cubes, ODS and quires
BW authorizationsareprimarilyfocused on data not on transactioncodes
and divided intotwo mainareasauthorizationfor administratorworkbench
and authorizationfor businessexplorer
Authorizationobjectsfor field level securityin reporting arecreated asand
when needed.
12. Which authorizationobjectgivesend user to execute/view a queryin
BW?
- S_RS_COMP
- S_RS_COMP1
- S_RS_FOLD
13. What isthe use of SU24 tcode?
SU24(checkindicator) holdsthe relationship betweentcodeand
authorizationobjectsincustomer tablesUSOBX_Cand USOBT_C tables
which values are pulled during role creation
SU24 used to maintainallthe objectsthat arechecked during tcode
execution
14. How do you check authorizationcheckfor a tcode?
Check SU24 for authorizationobjectand itsproposalalso we cancheck the
ABAP report as well
15. What is the authorizationobject which givesdeveloper debug
authorization?
S_DEVELOP with activity01, 02 or 03
16. How do you secure/giveaccessto a custom report to users
without giving SE38tcodeaccess?
Createan authorizationgroup for that report to secure it and giveSA38
tcodeauthorizationfor executionofthe custom report or createa custom
transactioncodeand maintainauthoritycheckand assignto users via role.
17. How do you createa custom tcode?
SE93 is the tcodeused to createa custom tcode
4. 18. How do you createa transport request?
SE01, SE09, SE10 tcodesare used to createa transport request and also we
cancreateduring customizationtimelike, PFCG, SE38, BD54, etc..
19. What arethe types of transport requests?
- Custom transport request
- Workbench transport request
- Transport of copies
- Relocation
20. What is the differencebetweencustom and workbench transport
requests?
- Workbench requestsarethose involve changesto cross client
customizing and repositoryobjects, thoseobjectsareindependent of the
client and the requestsareused to transport changed repositoryobjectsand
changed system settingsfrom cross client tables
- Customizing requestsinvolve changesto client dependent objects, so
custom transport request used to copy and transport requeststhat are
client specific
21. How do you schedule a background job
SM36 used to schedule background jobs
22. Have you worked on upgradeand stepsinvolved?
Yes
2A. Comparewith SAP values
2B. Compareaffected transactioncodes
2C. Roles to be checked
2D. Display changed transactioncodes
23. What is expert modein PFCG?
Expert mode in PFCG used to maintainexistingrolesit has following
options
- Delete and recreateauthorizationand profiles
- Edit old status
- Read old statusand mergewith new data
24. Which tableyou cancheckthe relationbetween compositerolesand
5. child roles?
AGR_AGRS
25. What arethe license types you assignto end users while creating it?
- Applicationprofessionalusers
- Applicationlimited professionalusers
- ApplicationESS user
26. You are not allowed to assignany roles to user profile further what
would be the reason for it?
User must have exceeded the limitationfor profiles assignment i.e312
27. Have you worked with auditors?
Yes with internalauditorsand explainit
28. Which tableused to view roles and org level values?
TableAGR_1252 maintainsrelationship betweenrolesand org field values
29. Which tableused to view roles and authorizationobjectsand itsvalues?
TableAGR_1251maintainsrelationshipbetweenroles, authorization
objectsand its field values
30. Where do you delete old audit logs?
SM18
31. Wheredo you look lock entries?
SM12
32. Which authorizationobject givesyou SM12 authorizationother than
S_tcode?
S_ENQUE
33. Wheredo you reset user buffer?
SU56
34. What is the mandatory field in addresstab in SU01?
Last Name
35. How do you lock a tcode?
SM01tcodeused to lock a tcode
6. 36. Which tablestores all ABAP reports?
TRDIR
37. How do you lock users who didn’t log in to SAP morethan 90 days?
USR02 tableswe canget last login dateand time
38. Which tableholds all valid activityfields?
TACTZ
39. ABAP report which is used for user reconciliation?
PFCG_TIME_DEPENDENCY
40. Tablewhich holds all possible authorizationfieldsas variables
USVAR