Presentation is loading. Please wait.

Presentation is loading. Please wait.

SAP Security Interview Question & Answers

Similar presentations


Presentation on theme: "SAP Security Interview Question & Answers"— Presentation transcript:

1 SAP Security Interview Question & Answers
For Free Demo Contact PH : (720) For Details : best-online-training.com

2 Explain what is SAP security?
SAP security is delivering correct entry to trade customers with admire to their authority or responsibility and giving permission in keeping with their roles. For Free Demo Contact PH : (720) For Details : best-online-training.com

3 2. Explain what is “roles” in SAP security?
“Roles” is noted a gaggle of t-codes, which is assigned to execute targeted industry undertaking. Each position in SAP requires exact privileges to execute a function in SAP that is called AUTHORIZATIONS. For Free Demo Contact PH : (720) For Details : best-online-training.com

4 3. Explain how you can lock all the users at a time in SAP?
Through executing EWZ5 t-code in SAP, all the consumer may also be locked at the same time in SAP. SAP Security T-codes: Frequently used security T-codes SU01 - Create/ Change User SU01 Create/ Change User PFCG - Maintain Roles SU10 - Mass Changes SU01D - Display User SUIM - ReportsST01 – Trace SU53 - Authorization analysis For Free Demo Contact PH : (720) For Details : best-online-training.com

5 4. How to create users? Execute transaction SU01 and fill in all the discipline. When growing a new consumer, you have to enter aninitial password for that consumer on the Logon data tab. All other knowledge is optional. For Free Demo Contact PH : (720) For Details : best-online-training.com

6 5. Explain what is authorization object and authorization object class?
Authorization Object: Authorization objects are agencies of authorization subject that regulates detailed activity. Authorization pertains to a detailed motion whilst Authorization subject relates for protection directors to configure specific values in that designated action. Authorization object class: Authorization object falls under authorization object courses, and they're grouped by using function area like HR, finance, accounting, and so on. For Free Demo Contact PH : (720) For Details : best-online-training.com

7 6. Explain how you can delete multiple roles from QA, DEV and Production System?
To delete multiple roles from QA, DEV and production system, you need to comply with beneath steps • Situation the roles to be deleted in a transport (in dev) • Delete the roles • Push the transport by way of to QA and creation This will delete all the all roles For Free Demo Contact PH : (720) For Details : best-online-training.com

8  7. Explain what things you have to take care before executing Run System Trace?
If you are tracing batch person identification or CPIC, then earlier than executing the Run approach hint, you need to ensure that the identity will have to had been assigned to SAP_ALL and SAP_NEW. It enables the user to execute the job with none authorization verify failure. For Free Demo Contact PH : (720) For Details : best-online-training.com

9 8. Mention what is the difference between USOBT_C and USOBX_C?
USOBT_C: This table consists  the authorization proposal data which contains the authorization data which are relevant for a transaction USOBX_C: It tells which authorization check are to be executed within a transaction and which must not. For Free Demo Contact PH : (720) For Details : best-online-training.com

10 9. What is the t-code used for locking the transaction from execution?
For locking the transaction from execution t-code SM01, is used. For Free Demo Contact PH : (720) For Details : best-online-training.com

11 10. Mention what is the main difference between the derived role and a single role?
For the only position, we are able to add or delete the t-codes even as for a derived role you can't do that. For Free Demo Contact PH : (720) For Details : best-online-training.com

12 11. Mention what is the maximum number of profiles in a role and maximum number of object in a role?
Maximum number of profiles in a role is 312, and maximum number of object in a role is 150. For Free Demo Contact PH : (720) For Details : best-online-training.com

13 12. Explain what is SOD in SAP Security?
SOD way Segregation of obligations; it's applied in SAP with a view to detect and avert error or fraud during the business transaction. For example, if a person or employee has the privilege to access bank account detail and cost run, it maybe viable that it will possibly divert vendor payments to his own account. For Free Demo Contact PH : (720) For Details : best-online-training.com

14 13. How do you create usernames in SAP?
Goto transaction SU01 and creating a new username, you must enter an initial password for that user on the Logon data tab and last name in address tab For Free Demo Contact PH : (720) For Details : best-online-training.com

15 14. List R/3 User Types ? Dialog - customers are used for character user. Examine for expired/initial passwords possible to change your own password. Verify for a couple of dialog logon carrier person - handiest person directors can change the password. No investigate for expired/initial passwords. Multiple logon accredited process - customers are usually not able of interaction and are used to participate in detailed procedure routine, similar to historical past processing, ALE, Workflow, etc. For Free Demo Contact PH : (720) For Details : best-online-training.com

16 4. Reference - person is, like a system consumer, a common, non-for my part associated, consumer. Further authorizations may also be assigned inside the system making use of a reference person. A reference user for further rights can be assigned for every person within the Roles tab. 5. communiqué information – GUI logon not viable and and investigate for expired/initial passwords and its used for RFC connections For Free Demo Contact PH : (720) For Details : best-online-training.com

17 15. What is a derived role? Derived roles consult with roles that already exist. The derived roles inherit the menu constitution and the capabilities included (transactions, experiences, web links, and so forth) from the position referenced. A role can only inherit menus and services if no transaction codes were assigned to it before. The larger-degree function passes on its authorizations to the derived position as default values which can also be modified afterwards. Organizational level definitions will not be handed on. They need to be created anew in the inheriting position. Consumer assignments usually are not passed on both. For Free Demo Contact PH : (720) For Details : best-online-training.com

18 Thank You For Free Demo Contact PH : (720)463-3800
For Details : best-online-training.com


Download ppt "SAP Security Interview Question & Answers"

Similar presentations


Ads by Google