Unable to restrict access to Query Designer
Hello,We are facing an strange issue related to BI authorizations. We have torestrict users in query designer such that they cannot edit any querywith the name starting from Z*. They should be able to...
View ArticleSOSB for all users
Hi Experts, We have a requirement to restrict SOST t-code for display only. But, as this is an Admin t-code i couldn't find a way to restrict this t-code via auth. objects/values. Hence, i tried SOSB...
View ArticleComposite roles not visible after refresh
Hi Team, In SU01, i am unable to see composite roles. Only single roles are visible. Recently system refresh happened in import/export method for User master data. After refresh only this is...
View ArticleSCM 7.0 / APO Security
With the new analysis authorizations concept the use of organizational restrictions within an ABAP roles is obsolete. Other than the three SAP recommended authorization relevant objects what other...
View ArticleSoD Matrix
I've been reading a about SOD but I've never seen an explanation on how to actually do the SoD Matrix. I'm currently on a project with a company who has not performed SOD. And I would like to help them...
View ArticleNeed help on Epiuse data sync Manager
Hi All, I am having a training on Epiuse data sync Manager where i have to set up some authorizations(which i do not know yet). Could you please let me know if there's any document available for Epiuse...
View Articlesap transaction log of users for a particular period
Hello gurus, please advice how to get transaction log of sap users for a particular period of time, For the last one year.workload analysis shows only last two months data by default. We have not...
View ArticleHow to use one PSE with multiple URLs?
I need to hit my DMZ SAP Web Dispatcher with multiple unique URLs. I am starting off using webdisp1.abc.com and webdisp2.vde.com. DNS will resolve both the Web Dispatcher Host. Following Tobias...
View ArticleUser is getting locked everyday
Hi,We have a user in BW system which is getting locked everyday since the past few days.This user ID is being used in Webi report publications and as a result the reports are failing.Pl let me know how...
View ArticleDynpro recording option in RAL not working
Hello. We are trying to configure the Read access logging(RAL) in our sandbox system(NW 7.31 SP9). While trying to record the fields of a dynpro transaction the record field option is not available in...
View ArticleAuthorisation issue with T-code CA85 N for mass update
Dear Security gurus, One of the business user in our project is trying to use CA85N to mass update . He needs to bulk update to "X" the CostingRelevncy indicator for all SG35 routings. He has the...
View ArticleDisable changing variables during debug for a specific program
Hi, We've a program that we need to run ONLY IN DEVELOPMENT system (it will not be moved to QA or Prod). As all developers will have debug access, we some how want to restrict all users from changing...
View ArticleRSEOUT00 - CUA Child system disconnecting.
Is RSEOUT00 mandatory while disconnecting a child system from CUA. Please help me in understanding? I'd always done this while disconnecting CUA with one of the clients (organization) I worked for....
View ArticleDisplay/Edit the CRM transaction based on status value selected in status field
Hi Experts Is it possible to Display/Edit the CRM transaction(all assignment blocks in the Transaction overview page) based on status value selected in status field (using CRM security objects)? I am...
View ArticleJCo RFC-Call just from specific user
Hello People, i have a small security issue that i need to solve, and currently i don't know how i should do it, but i'm sure you people can help : ) I have a Java Webservice that connects via JCo to...
View ArticleEnquire authorization setting in material no. control
Hi everybody, Could you advice how to limit "create" or "change" activity for user under the following situation? Situation: some particular user can create or change that particular material number...
View ArticleRecommended Settings for the Security Audit Log (SM19 / SM20)
Hi Security-Folks, I like to discuss with you the recommended settings for the Security Audit Log (SM19 / SM20). Here's my proposal: Profile Parameters: rsau/enable = 1rsau/selection_slots =...
View ArticleUnable to restrict access to Query Designer
Hello,We are facing an strange issue related to BI authorizations. We have torestrict users in query designer such that they cannot edit any querywith the name starting from Z*. They should be able to...
View ArticleSSL/TLS Protocol Initialization Vector Implementation Information Disclosure...
I just read blog How to Protect AS ABAP & AS Java Against BEAST AttacksNow I have some further question about ssl/ciphersuites. When I set it to 129:HIGH scan report says that "A vulnerability...
View Articlehow to resrtict va11 Tcode based on Plant??
HI,Need to Restrict the VA11 Tcode based on Plant ??
View Article