No Authorization for Equipment Category
Hi Experts, All users are empowered with SAP_ALL authorization in our clients Development client. However when a user tried to change some equipment master data using TCode IE02 an error message...
View ArticleBobj - BO Security : how can I find the list of access that a GROUP has ?
HI all, I can't find a place where we can have a list of access that a group has, I'll try to better explain this : I have a user group, called "Webi Users" and I have assigned this user group to a new...
View Articlehow to search authorization objects by field?
A developer wrote a custom report. It uses some fields that are sensitive. I tell developer he must write AUTHORITY-CHECK into the code and then he asks me "ok... I will do that, but which...
View ArticleIs the cert code P_ADM_SEC_70 already replaced by code C_AUDSEC_731
Hello All, I search the cert code P_ADM_SEC_70 but it is no longer found in SAP training site.Is it already replaced by C_AUDSEC_731 or is there a new version for P_ADM_SEC coming out? Regards,Emael
View ArticleAccess to ABAPER On Production
Dear All Experts,Here, ABAPERs want to access of Debugger, SE16, SE37, SE38, SE80 on Production Server while due to security reasons I have denied number of time but every time when they went in...
View ArticleAUthorizations needed to change parameters in SU3
Gurus, What is the authorization needed to change parameters in SU3 ? I have them in change mode in one environment and only in display mode in another one. Thanks for your help, Olivier
View ArticleLDAP Connection problem
Hi everyone, I am trying to setup a LDAP connection from ABAP WEB AS ECC6.0 to Win Server 2003 Active Directory.The AS is running on HP-UX v11.23. In setting up I used the steps mentioned in the ECC6.0...
View ArticlePayment Tolerance Groups
Hello I originally posted this in the incorrect forum. I wanted to see how the structure from a security perspective works for restricting users by tolerance groups for payments. I know where and how...
View ArticleImpact of SAP ECC6.0 upgrade from EHP4 to EHP6, Security perspective.
Hello, Our client is planning to upgrade SAP ECC6.0 system from EHP 4 SP6 to EHP6 SP5.I am unable to find appropriate documents/discussions that will tell me if it has any impact on SAP Security...
View ArticleBI Authorization - exclude query views from search result in Analyzer
Hi Experts, I have an issue. The problem is that users can see query views in the search result when they are using Find option in Bex Analyzer.I have the menu roles where the S_RS_COMP is included,...
View ArticleSM59 and a HTTP Client Connection Using SSL
All, I'm running an ECC 6.0 (EHP 5) system. Our ECC System is a dual stack system. We've recently enabled SSL on the ECC's java stack. The SSL Server Certificate has been signed by my organization's...
View ArticleMaking Key figure Authorization relevant in Analysis Authorization
Hello, I want to make restriction on Key figure in analysis authorization. Please suggest how I can do that. I have made 0TCAKYFNM as auth. When I add 0TCAKYFNM this to analysis authorization it gives...
View ArticleDeleting position to role assignment logs??
Hi Gurus,Recently somehow for some users, their relationship with the position was deleted. (Via PPOMA I think) Is there a way to see who and when it was deleted?Background of issue.Users mentioned...
View ArticleAuthorization Trace in BI
Hello, Is there any way in BI where I can run a authorization trace in BI, similar to ST01 in R/3. For example there is a user 'A' who is able to execute a query correctly. When I go in RSECADMIN...
View ArticleAUthorizations needed to change parameters in SU3
Gurus, What is the authorization needed to change parameters in SU3 ? I have them in change mode in one environment and only in display mode in another one. Thanks for your help, Olivier
View ArticleHow to make SAPPORTALSDB0 cookie in Portal secure?
Portal 7.01 SP11generates multiple cookies namely JSESSIONID, SAPPORTALSDB0, MYSAPSSO2, PortalAlias, saplb_*, SAPWP_active. We found ways to make almost all of them to be sent through secure channels...
View ArticleSend notifications received in the inbox for external mail automatically
hello experts,I have a workflow that sends notifications to the user's SAP inbox. I need to send the notifications received in the inbox of each user of SAP for their e-mail externally. I've checked...
View ArticleHow to secure generated files?
Our legal department wants to generate intellectual property files in our BI system for analytics and reporting, but wants us to ensure that no one will be able to access these files via SE16 table...
View ArticleUser is still locked
Hello Experts,We are facing a problem with our systems. I have observed some of the users got locked due to multiple login with incorrect password. Exact message in SU01-Password logon not allowed (too...
View ArticleUser passwords at CUA setup time
Hello, I'm looking forward to setuping CUA. Lets say CUA is system ABC, child systems are XYZ1 and XYZ2.User John exists in both XYZ1 and XYZ2 with same username, but with different passwords.Now the...
View Article