A_S_ANLGR Missing authorization for company code
Dear All, I am facing issue with authorization object A_S_ANLGR with filed BUKRS in a role for the tcode- AS81.When i give company code or all company codes in the field BUKRS system not allowing me to...
View ArticleBI Security at RSA1 tcode level
Dear All, Would like provide security for BI system at ABAP stack level i mean at modelling level RSA1 tcode.For example restricting from RSA1 tcode like info-object creation, info-object catalog...
View ArticleAuthorization group in OB52
Hi Experts! I am trying to configure extra authorization for a group of users in OB52; this field: But I am really lost about authorizations. Do you have any tutorial so I can follow it and achieve...
View ArticleUME Security - Java Scheduler 'Action' authorization
Hello Security gurus! Our PI team would like to have access to the NWA Java Scheduler. They currently have the NWA_READONLY role, the only role that we found that provide access to the scheduler is...
View ArticleRecord Management
Hi, I am trying to restrict subcomponents in Record Management. I can achieve this with the S_SRMSY_CL authorisation object, where I restrict the Element Type ID to only those that the users should...
View Articlenew tab in su01 (SNC)
Hi Everyone, I am very new to SAP Security , can any body brief me what is SNC in su01 ? In Practical how it works ?
View ArticleZero-Day exploit at Java lib Common Collections
Hi Gurus, I found the a post stating there is a Zero-Day exploit in the common collections function InvokerTransformer. Found by Gabriel Lawrence and Chris Frohoff shown in their presentation....
View ArticleProblem with SSL Cipher TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Dear experts, our logistic partner recently switched his ssl cipher from TLS_RSA_WITH_AES128_CBC_SHA to TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. I downloaded the according ssl certificate, but our RFC...
View ArticleMoving Transport request from Dev to Prod
Hello, I think this is the place to put questions on SAP Basis. I need to moved Transport from dev to prod system in ECC. But I do not have auth of STMS in prod to import TR in prod. 1) one way is to...
View ArticleBW Analysis Authorization Issue
here is a scenarioInfo provider: ZHRPYO01 (standard DSO) within this DSO there is a characteristic which is set as authorization relevant – 0EMPLSGROUPRoles assigned: ZS:BW-DAT-SAL-PAYROLL-1Query...
View ArticleSAP PI Role Upgrade
We are in process of migrating SAP PI(Dual Stack) to SAP PO (Java Stack), We have observed some discrepancy in current world roles and new world roles.And we would like to Keep existing...
View ArticleFind out roles needed
Hi,I am debugging a program and do not have change access in debugging and also for few programs the authority-check is failing.The basis team has asked for a list of roles for which i need access. Can...
View ArticleRestricting SM35 by Program Name
Dear All, Does anybody know a way to restrict what programs can be released/executed from transaction SM35. When I run a trace I find the below: UserProgram NameCheckResultObjectField 1Value 1Field...
View ArticleDocumentation page in PFCG
hi there, in the initial PFCG screen there's an option button to either show or hide documenation.usually when the option show documentation is enabled, it returns a type of 404 explorer page ("The...
View ArticleCan we find the auth method used after a user has authenticated ?
When a user is authenticated to an SAP ABAP system, they can use a userid and password, SNC or an SSO2 ticket. Is there a report, or some other way to get a list of user authentications over a period...
View ArticleTest Scripts
HI All, Can anybody suggest the test cases/test scripts which we can use for technical single role testing thanks!
View ArticleProfile Creation Date
Hi All, I want to profile creation date and I have used all the SAP Standard tables for the same. But everywhere I am getting only the modification date.. is there a way to get profile creation date?...
View ArticleRestrict WBS elements while creating Requesitions
Hi Experts, We have a security requirement to restrict users from using different WBS elements while creating Purchase Requisitions ME51N. I tried to use auth objects C_PROJ_VNR and C_PRPS_VNR by using...
View ArticleCloud Identity Service - Customization
I understand Cloud Identity Service offers some possibilities for customization eg. colour theme and email template.I would like to know if it is possible to customize the text shown on the webpage...
View ArticleConnection between role, T-code and activity
Hi all, I'm looking for am amswer how to find the connection between role, T-0code and activity, meaning that for exa. if in one role under S_Tcode there are few T-codes, and in all other objects in...
View Article