Use case for V_KOND_VEA
Hello I am looking for an example how to use the authorization object V_KOND_VEA, I have not found anything that can help me. Is anybody might help me and show me jow to use this item ? For example, if...
View ArticleDigital Signature with SSFSDEMO
Hi Experts, I have a little problem with the report SSFSDEMO. When I start this report and try to sign the data with the example certificate it does not work. Does anybody know where I can find this...
View ArticleRestrict Vendor Master Attachment Create / Delete
SAP ECC 6Transactions - XK01 / XK02 / XK03 When a user is within the Vendor Master I have been able to restrict the user from Deleting other users attachments (Note 825348). I am struggling to figure...
View ArticlePossibility to allow only digit based passwords in NetWeaver ABAP
Hi, Is it possible to setup up the password rules for NetWeaver ABAP, so that it's only possible to have password with digits? Based on the password rules here...
View ArticleASSET HISTORY SHEET
I am trying to run S_ALR_87011990 with a report This report is the ASSET HISTORY SHEET. When I run it, it gives me an error saying " No Data was selected" when i running same with SAP_ALL...
View ArticleWhat is the best practise to implement security concepts in R3 and BW for...
Security is already implemented for US territory but we need to implement security for other territories also.What is the best practice to implement security concepts for R3 and BW systems for...
View ArticleHow to create a master role for more than two existing similar single roles?
Hi There, Could anybody help me to create a master role for more than two existing similar single roles? I have two same roles and I have to create master role for the same without deleting the these...
View ArticleRecommended Settings for the Security Audit Log (SM19 / SM20)
Hi Security-Folks, I like to discuss with you the recommended settings for the Security Audit Log (SM19 / SM20). Here's my proposal: Profile Parameters: rsau/enable = 1rsau/selection_slots =...
View ArticleHow to provide controled sm30 access to a field in a customised table??
Hi, I recieved a request from our users to create a role which will give sm30 access to a particular field in a customised table. I know we can restrict access to atable by using S_TABU_NAM...
View Article3rd Party OAuth Authentication Servers
Does the SAP NetWeaver Gateway have any support for connecting to a 3rd-party OAuth Authentication Server? I don't see anything in the documentation.
View ArticleSSL Server Standard and SSL Client Standard PSE's missing.
Hi, Title: SSL Server Standard and SSL Client Standard PSE's missing. iam about to configure strustsso2. But i cant find the above PSE's in this transaction. When i checked Transaction SMICM - Trace...
View ArticleSAP ID Identity Provider API ?
I am using SAP ID identity provider for my Java/HANA application. I would like to programatically add users to the Identity Provider from my Java app. Is there an API available that would allow me to...
View ArticleRestrict Vendor Master Attachment Create / Delete
SAP ECC 6Transactions - XK01 / XK02 / XK03 When a user is within the Vendor Master I have been able to restrict the user from Deleting other users attachments (Note 825348). I am struggling to figure...
View ArticleCUA during Upgrade
HI We have CUA configured in Solution Manager .We are planning to upgrade solution manager to the latest patch available . During downtime of solution manager How do we manage the CUA and user...
View ArticleAll objects are inactive in derived roles (copied from existing derived role)
I need to create more than 1000 derived roles, from existing reference roles.Reference roles are also derived roles. So I executed LSMW for mass copy.Eg: Reference role XYZ with parent role XXXNew...
View ArticleKE97 authority-check
Hi,In our company many users use transaction KE24 but they should be able to display only records of specific company and profit center. We are trying to use the KE97 transaction code in order to add...
View ArticleS_RFC Additional Authority Check RFC_TYPE:FUGR & RFC_NAME:SHI5 while running...
Dear All, From today itself we are facing the issue, as there is an additional check happening while running the t-code SUIM in SAP System. I can't understand why this happening, I have checked If...
View ArticleRe-generating derived roles shows changes
Hello, I respectfully ask for your guidance as I am unable to find the necessary documentation needed to support a request for our auditors. Currently, we utilize a derived role methodology with...
View ArticleCUA Upgrade to higher version needed?
Hello,SAP recommends having the most current / highest version for the CUA in the landscape. In a scenario where the child systems are being upgraded to NW component 7.4 and retaining NW 7.31 for the...
View ArticleAuthorization object for roles affecting BW reports
Hi All, We have created an authorisation object in the system which apply to all BW queries / reports. The authorisation object restricts a field / infoobject 0COMP_CODE to a particular range of...
View Article