Do SAP Security Notes contain hacker and/or virus defence?
Dear SCN fellows, I am new to this community and generally new to asking for SAP help in discussions and blogs. I need some advice on whether SAP Security Notes contain hacker and/or virus defences? I...
View Articlehow to restrict this blank user group from password reset S_USER_GRP
Hi, I created on password reset role, in that user can lock/Rest only for one user group named as "AMERICA". I maintained the S_USER_GRP as below. Activity 03User group in user...
View ArticleAvailable ER Access Tools
Hello, Can anyone provide some insight on SAP GRC specifically firefighter (FF) access. Is this all through the SAP Netweaver portal or on the ABAP side. Also, if there's any other FF tools out...
View ArticleAfter migration from BI 7 to BI 7.3 through RSECADMIN some doubts
After migration from BI 7 to BI 7.3 through RSECADMIN, for some of the existing analysis authorizations Version status - Active Runtime Version - Active, Executable but for some existing AA's Version...
View ArticleAuthorizations Access to a company code
Hello everyone, First of all, i'm happy to join the SAP comunity, i hope that i will learn a lot with you ! I have a question, i tried to have a report on SUIM, to know which user have access to...
View ArticleUser mapping - Trusted RFC - 2 SAP Systems
Hi, we have a problem regarding different user id´s in 2 SAP systems. We have a global SAP system and a local SAP system. On our global SAP we have a BSP application. This BSP writes data into local...
View ArticleSAPALL for customizing (in some module)
Hello, I found some post with a similar question....so now I know for example that all the profiles that begin SAP_MM* (transaction PFCG) are profiles standard SAP for give all the authorization for...
View ArticleHow to setup security to view deleted sales order deletion information
User is going into VA03. entering a sales order number but instead of hitting enter, is going it to the top menu, selecting Environment and then changes. When the screen appears, they are selecting...
View Articleis it possible to give a user read access to an SAP table but to restrict it...
Hi, is it possible to give a user read access to an SAP table but to restrict it to a subset of columns? Thanks,Digesh
View ArticleSystem Recommendations Security Notes
Dear Colleagues,We have started to use the system recommendations in Solution Manager 7.1 SP6. We are applying all security notes regarding priority 1 and 2. We have seen that especial in the area of...
View ArticleUtilizing SQ01 SQ02 for user report generation of production data
I am interested in utilizing sap query transactions SQ01, SQ02, and SQ03 to create and customize end user reports that will be used by our audit team to analyze SAP data in our production environment....
View Articlelimit access to a cube in a multiprovider
Hello I need a help with the security case. I have multiproviders nameb like AAAA, BBBB, CCCC upon what hundreds or queries are built. Multiprovider AAAA contains cubes:cube1cube2cube3multiprovider...
View ArticleEHP 7 - Recommended Security Approach?
This is my first experience with an Enhancement Pack implementation, so please forgive me if my questions are very basic. Our company implemented EHP 5 and is now moving to EHP 7 for ECC and I was not...
View ArticleAuthorization: How to find out which users use some specific transactions...
How to find out which users use some specific transactions with some specific activities? Dear All, Due to internal authorization audits I have the following problem.I need a flat list of users which...
View ArticleTable name to get last changed date, last changed by details of Single Role...
Hi, Any one help me by giving the table name, so that i can get the last changed date, last changed by details of Single Role and Composite role.
View Articleunable to move personalization object key changes to other system
Hi Gurus, I am unable to move Personalization object key changes to other system(ex. Dev t Qua). In Dev while transporting am selecting options as Generate Profiles for single Roles and Personalization...
View ArticleTcode SOST
Dear All, Please need your quick help for below.We are using tcode SOST and we need restriction where one employee should not view the Mail content display of other.As of now at role end we are...
View ArticleStructural Authorisations - No Objects Found
Hi Experts, I've built a structural authorisation profile which utilises the FM RH_GET_ORG_ASSINGMENT, as outlined below: When assigned directly to a user (via OOSB), the user is restricted to their...
View Articlehow to restrict bypassing of authentication
HI experts, we have second factor authentication involved in our portal product , by using hacking tool burp Suite im able to capture the response and request coming from the server .Case 1 : user have...
View ArticleNeed informaiton on upgarde solman system from 7.0 to 7.1
Hi Experts , Iam new to upgrade in Secuirty. Currently we are doing upgrade for Solman system from 7.0 to 7.1. Can you please help me how we can approach on this from Secuirty perspective. Thanks,...
View Article