Access Cleaning in SAP ECC6.0
Hi Experts I have one requirement where in for essentially every T-codes there is excessive access in SAP. Reason could be many but I am not bothered. My job is to clean such access and make it...
View ArticleSAP PI vulnerability tool
Hi experts,Is there any tool oriented to check the PI vulnerability?. A tool to identifies adapter problems in the JDBC, SOAP and so on adapters, java/ABAP configuration risks in PI, security notes not...
View ArticleSQ01 - Disable create/change button
We are currently on Basis release 4.6 C, I am trying to disable Create/Change button in SQ01 transaction, following one of the SCN posts I Unmaintained S_QUERY Authorization object. This solution...
View ArticleAvoid deletion of shipping cost document
Hello all, with which user exit can i avoid the deletion of shipping cost document? I simply want to trigger error message when the user push the delete button in VI02... Thanks in advance Luis
View ArticleSAP SRM Authorizations With Netweaver Portal
Dear All, We are using SAP SRM 7.1 with netweaver portal. When I customize / copy a portal role related to SRM content and a backend role, how do I map one to the other to ensure I can control the...
View ArticleCustom Tcode not working after transport to Quality
Hi Gurus, I have created a custom Tcode in se93, and linked it to a ztable. This ztable is used to maintain data manually. But my problem is that the ztcode & table work fine in dev. but when...
View ArticleSAP Security weekly, Monthly, Yearly Activities
Dear Experts, As a SAP Security Consultant,what are the list of SAP recommended activities to be performed in Production environment to well maintain the system.can you please provide me list o SAP...
View ArticleCould we restrict ability to approve hours in CATS_APPR_LITE and CAT7?
Hello everybody, we're looking for the way to restrict ability of users, that access to CATS_APPR_LITE transaction, to approve hours only entered by specific CID(s). Is there a specific authorization...
View ArticleLooking for information about "data breach notification process"
I am looking for information on an "data breach notification process" for SAP HCP. If anyone knows about an official SAP policy document that addreses this aspect please let me know. Thanks, Randolf
View ArticleDerived roles are getting overwritten everytime when I update Master Role.
Hi Experts ! We have created some Master and Derived roles in the past. According to the requirement we have made some changes directly in the derived roles like some value of objects, activities,...
View ArticleIn what case would you assign transaction to System User Type?
I am an ABAP developer who has been doing some very basic security research, and I want to ask what I think are some fairly simple questions to which haven't been able to find any really good...
View ArticleTo enable the SNC between LDAP connector and the AD server
Hi All, I have a requirement to enable the SNC between LDAP connector and the AD server to secure the connection, I have gone through some notes and docs. I am not getting the correct one. Kindly...
View ArticleAll Possible Values Field Authorization
Hi everybody! I need a view or SAP table where that view should has the following header: MANDANT,AUTHORIZATION OBJECT ,FIELD,VALUE The data i want to see is about of all possible values of fields. Y...
View ArticleError while connecting via SSO using SNC parameters of SAP .NET Connector
Our SAP systems at my company are not SSO. But we have recently developed quite a few ASP.NET web applications that use the SAP .NET Connector to read and write data into and out of SAP. We would...
View ArticlePPOME - taking away transport request
Hello, I was hoping someone with PPOME / workflow knowledge could help me here... Currently, are company locks down the transaction code PPOME, meaning you have to submit a transport request any time...
View ArticleIs it possible to create sub-client with in SAP production (PRD) client
Hello Experts, Is is possible to create sub client with in SAP production client? The question came to mind is that if I am the father company of two child/sub companies and both these function under...
View ArticleIdentify deleted roles ?
Hello everyone, I was going through the AGR_1251 table and identified the "DELETED" field with an "X".Does that mean that the role ("AGR_NAME") is deleted from SAP ? 1) If the role is deleted, can...
View ArticleSAP BI Security - Analysis authorization not working when drill down done in BEX
Hello Folks, We are currently working on setting up BI Security with Analysis Authorizations.We have created an Analysis Authorization to restrict a Infoobject plant to say value 100, 200 and...
View ArticleWhat kinds of user activities can RAL log?
Hi guys,I have questions about the functions of RAL.Can it be said that RAL log all user activities about creating, reading, editing and deleting the data in applications?Otherwise, Can RAL log...
View ArticleClient does not exist message in SCUL
Hi Team, Need help in resolving the issue. I am getting "client does not exist" message (for one system in CUA), when i run scul for the users RFC's are fine. CUA is also green. And client also exists....
View Article