Auth issue with the T-codeFMBB
Hi All, There is a issue with the T-code FMBB which is doesn't allowing to delete the attachment. Please provide the inputs to resolved the issues
View ArticleTransaction FMBB does not allow deletion of attached document
Hi All, Can any sort this issue for the following one:Transaction FMBB does not allow deletion of attached document(Transaction FMBB has a security issue will removing documents that have been...
View ArticleHttp only cookie information disclosure vulnerability on sap net weaver...
HI Experts, after the penetration test we came to know that our portal server is having this issue can you please suggest me how to get rid off this. we are using SAP Net weaver 7.3 eph1 Apache 2.0...
View ArticleHCM Pay sales / Grade Authorization
Dear Expert Management want that only authorized person can see the salary of management staff. Every employee has one position code assigned. And in position, employee grade is attached using...
View ArticleCan SAP User Menu be designed independent of SAP roles
Dear Friends, my query is Can SAP User Menu be designed independent of SAP roles Query in detail: We have designed role matrix for our users as per designation.For example :-Role 1ME21N- Create...
View ArticleUser ID Issue
Hi, A user (Psmith) is having an issue running a query in portal. If we copy his/her account (Psmith) to another name (P1smith), he/she has no issue. We tried to deleted and recreated the account...
View ArticleSAP SECURITY CERTIFICATION IN INDIA
Hi Techies, I have a small doubt regarding SAP SECURITY CERTIFICATION i want to attend the P_ADM_SEC_70, but i cant able to find any schedule for this in INDIA. Can you please help me anyone regarding...
View ArticleDuplications in Role assignments - Still a problem
Hello Everyone, Am a newbie to SAP Security. Could you please help me with the below question. Why SAP does not recognize the duplicate assignment of a role during the role assignment for a user ? For...
View Articlehow to search authorization objects by field?
A developer wrote a custom report. It uses some fields that are sensitive. I tell developer he must write AUTHORITY-CHECK into the code and then he asks me "ok... I will do that, but which...
View ArticleIdentify Which External Applications are Calling Your RFCs
Question: Using RFC Web Services, how can remote calls to these RFCs be engineered in such a way as to be able to identify the calling server AND application name? What are the prerequisites for doing...
View ArticleIssue while trying to import metadata table MARA
Hi We have just performed a test with data service 4.1 and get the following authorization error. Error : cannaot import the metadata table <name = mara>. RFC callReceiver error...
View ArticleMaking Key figure Authorization relevant in Analysis Authorization
Hello, I want to make restriction on Key figure in analysis authorization. Please suggest how I can do that. I have made 0TCAKYFNM as auth. When I add 0TCAKYFNM this to analysis authorization it gives...
View ArticleSRFC implementation
Hi Experts, At present we have a scenario with RFC connection between web service to SAP systems. now we are planning to implement Secure RFC for the same sceanrio. So could you please suggest how to...
View ArticleConsuming a web service using a username token
Hello, I've to change an existing ws proxy to send a username token to meet our increased security needs. Therefore- I changed the the proxy configuration in the IDE from none to basic- I configured a...
View ArticleUsing Profit Center as an Org Level in PFCG
Hello SAP Security Experts, We are considering making Profit Center an organizational level in PFCG. Specifically, we need RESPAREA to be made an org level to derive roles based on profit center...
View ArticleVD03 bank data of vendor in search box
Hello, because of legal requirements bank data of vendor should not be displayed in VD03. No problem to hide the tab including bank data but in case I am searching for a vendor by pressing F4 (search...
View ArticlePosition Based Security Model
Hello Experts, In one of our projects we are looking to implement indirect role assignment model (Position Based Security Model). The main challenge we arefacing is.. How to map / configure external...
View ArticleRSUSR200 - days since last logon - wrong result
Hello, I'm using report RSUSR200 in a Solution Manager 7.1 system with SPS08 via SUM to show users, which logged in in a system since yesterday.But if I put value "1" into field "No. days since last...
View ArticleAuth issue with the T-codeFMBB
Hi All, There is a issue with the T-code FMBB which is doesn't allowing to delete the attachment. Please provide the inputs to resolved the issues
View ArticleHR Object Type $$
Does anybody know the meaning of object type $$ ? I recently added OKENN ( cost centre structure) into a role for access to many company codes cost centre structures it, All was ok until it came to...
View Article