Quantcast
Channel: SCN : Discussion List - Security
Browsing all 2353 articles
Browse latest View live

Do SAP Security Notes contain hacker and/or virus defence?

Dear SCN fellows, I am new to this community and generally new to asking for SAP help in discussions and blogs. I need some advice on whether SAP Security Notes contain hacker and/or virus defences? I...

View Article


how to restrict this blank user group from password reset S_USER_GRP

Hi, I created on password reset role, in that user can lock/Rest only for one user group named as "AMERICA". I maintained the S_USER_GRP as below. Activity                       03User group in user...

View Article


Available ER Access Tools

Hello,   Can anyone provide some insight on SAP GRC specifically firefighter (FF) access. Is this all through the SAP Netweaver portal or on the ABAP side. Also, if there's any other FF tools out...

View Article

After migration from BI 7 to BI 7.3 through RSECADMIN some doubts

After migration from BI 7 to BI 7.3 through RSECADMIN, for some of the existing analysis authorizations Version status - Active Runtime Version - Active, Executable but for some existing AA's Version...

View Article

Image may be NSFW.
Clik here to view.

Authorizations Access to a company code

Hello everyone, First of all, i'm happy to join the SAP comunity, i hope that i will learn a lot with you ! I have a question, i tried to have a report on SUIM, to know which user have access to...

View Article


Image may be NSFW.
Clik here to view.

User mapping - Trusted RFC - 2 SAP Systems

Hi, we have a problem regarding different user id´s in 2 SAP systems. We have a global SAP system and a local SAP system. On our global SAP we have a BSP application. This BSP writes data into local...

View Article

SAPALL for customizing (in some module)

Hello, I found some post with a similar question....so now I know for example that all the profiles that begin SAP_MM* (transaction PFCG) are profiles standard SAP for give all the authorization for...

View Article

How to setup security to view deleted sales order deletion information

User is going into VA03. entering a sales order number but instead of hitting enter, is going it to the top menu, selecting Environment and then changes.  When the screen appears, they are selecting...

View Article


is it possible to give a user read access to an SAP table but to restrict it...

Hi, is it possible to give a user read access to an SAP table but to restrict it to a subset of columns? Thanks,Digesh

View Article


System Recommendations Security Notes

Dear Colleagues,We have started to use the system recommendations in Solution Manager 7.1 SP6. We are applying all security notes regarding priority 1 and 2. We have seen that especial in the area of...

View Article

Utilizing SQ01 SQ02 for user report generation of production data

I am interested in utilizing sap query transactions SQ01, SQ02, and SQ03 to create and customize end user reports that will be used  by our audit team to analyze SAP data in our production environment....

View Article

limit access to a cube in a multiprovider

Hello  I need a help with the security case. I have multiproviders nameb like AAAA, BBBB, CCCC upon what hundreds or queries are built. Multiprovider AAAA contains cubes:cube1cube2cube3multiprovider...

View Article

EHP 7 - Recommended Security Approach?

This is my first experience with an Enhancement Pack implementation, so please forgive me if my questions are very basic. Our company implemented EHP 5 and is now moving to EHP 7 for ECC and I was not...

View Article


Authorization: How to find out which users use some specific transactions...

How to find out which users use some specific transactions with some specific activities? Dear All, Due to internal authorization audits I have the following problem.I need a flat list of users which...

View Article

Table name to get last changed date, last changed by details of Single Role...

Hi, Any one help me by giving the table name, so that i can get the last changed date, last changed by details of Single Role and Composite role.

View Article


unable to move personalization object key changes to other system

Hi Gurus, I am unable to move Personalization object key changes to other system(ex. Dev t Qua). In Dev while transporting am selecting options as Generate Profiles for single Roles and Personalization...

View Article

Tcode SOST

Dear All,      Please need your quick help for below.We are using tcode SOST and we need restriction where one employee should not view the Mail content display of other.As of now at role end we are...

View Article


Image may be NSFW.
Clik here to view.

Structural Authorisations - No Objects Found

Hi Experts, I've built a structural authorisation profile which utilises the FM RH_GET_ORG_ASSINGMENT, as outlined below: When assigned directly to a user (via OOSB), the user is restricted to their...

View Article

how to restrict bypassing of authentication

HI experts, we have second factor authentication involved in our portal product , by using hacking tool burp Suite im able to capture the response and request coming from the server .Case 1 : user have...

View Article

Need informaiton on upgarde solman system from 7.0 to 7.1

Hi Experts , Iam new to upgrade in Secuirty. Currently we are doing upgrade for Solman system from 7.0  to 7.1. Can you please help me how we can approach on this from Secuirty perspective. Thanks,...

View Article
Browsing all 2353 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>