find authorization object value for user
Hello Friends,Do you know of any Function module or transaction that tells if a particular user has authorization to a given authorization object?
View ArticleUsers Access to SE38
Greetings everyone, As far as I know users with access to SE38 can run any ABAP program that is not assigned to an authorization group (and does not have authorization check in the code i guess). My...
View ArticleDelete an already released transport request
Hello together, I have a problem in SE09/SE10 with a transport request. The request is as follows: Modifiable D01K939667 100 Username /Description D01K939668 Username...
View Articleusage of SM18, SM19, SM20
please explain the usage of transaction codes SM18, SM19, SM20 in SAP, for audit. RegardsPuneet
View ArticleTwo factor authentication for SAP GUI
Is there any solution out in market which support two factor authentication for the SAP GUI users? SAP Log on module source is protected which may not be suitable to extend for customization for 2nd...
View ArticleSM30, SE16
What is the basic difference in using SM30 and SE16 to get the data from the tables.Also, Is there any use in preventing the users the use of SM30 from the security point of view.Thanks, DVRK
View ArticleSecurity interview questions - some fun to tickle your brain.
Hello gurus, I know that posting interview question series are not allowed if the person has not put in any effort, but I have and folks seem to want to practice a bit sometimes so I take the liberty...
View Articlefind authorization object value for user
Hello Friends,Do you know of any Function module or transaction that tells if a particular user has authorization to a given authorization object?
View ArticleUsers Access to SE38
Greetings everyone, As far as I know users with access to SE38 can run any ABAP program that is not assigned to an authorization group (and does not have authorization check in the code i guess). My...
View ArticleBackground jobs and variant
Hi Guys, I have couple of question regarding background jobs. Can anyone please tell me how to create user variant for background jobs for example I want to create a user variant for this background...
View Articleusage of SM18, SM19, SM20
please explain the usage of transaction codes SM18, SM19, SM20 in SAP, for audit. RegardsPuneet
View ArticleSSL Strust : Issuer certificate missing in database
Hi, I am apply ssl in Abap stack STRUST. When i apply the certificate respond from the CA , it showing error Issuer certificate missing in database:CN=DigiCert High Assurance CA-3, OU=www.digicert.c...
View ArticleSecurity interview questions - some fun to tickle your brain.
Hello gurus, I know that posting interview question series are not allowed if the person has not put in any effort, but I have and folks seem to want to practice a bit sometimes so I take the liberty...
View ArticleConcern on SAP Security
Hi All,I have come across a research finding on the vulnerability of SAP installations, in the link below. How and what are you guys putting in place to countermeasure these...
View ArticleS_RFCACL not editable in release 701?
Hello, We're currently doing an upgrade from Release 700, SP-Level 014, to Release 701, SP-Level 016. In our CRM system, I'm trying to edit the authorization object S_RFCACL so I can add new SIDs. I'm...
View ArticleUsers Access to SE38
Greetings everyone, As far as I know users with access to SE38 can run any ABAP program that is not assigned to an authorization group (and does not have authorization check in the code i guess). My...
View ArticleDifference between Role & Profile
Hi I created users through SU01 and assigned the profiles e.g SAP_ALL, SAP_NEW etc. When i created profile using profile generator and assign, it assign to Role & Profile . Can you please clearify...
View Articleusage of SM18, SM19, SM20
please explain the usage of transaction codes SM18, SM19, SM20 in SAP, for audit. RegardsPuneet
View ArticleHow to find T.Code in user Role
Dear Experts, How to check transaction code maintained for user Role.For Example I have one User X who have Authorization of T. Code J1IDis it possible to find out T. Code J1ID is maintained in which...
View ArticleHow to mass lock all users
We are planning an upgrade from 4.6C to ECC6. Once we have gotten the system upgraded, we only want to allow certain users access to the systems for a time, developers, basis, etc so they can do some...
View Article