Places where an userID is used
Hi Friends,We are performing few system clean-ups in an existing SAP systems and I need an information before we delete any data on this.Suppose if we get a request to delete an user in a client, is it...
View ArticleRe: User logged in via SSO or manually?
Greetings, Using SM20, I was able to determine the logon method. Logon successful (type=A, method=P ) was using passwordRFC/CPIC logon successful (type=F, method=R ) was using SSO.Of course the...
View ArticleRe: Places where an userID is used
Please go through the below discussion how to find detail of RFC connection, established by using one ID.
View ArticleRe: Places where an userID is used
Usually, to avoid these issues the users are never deleted. They are locked, stripped of all roles and moved to special user group to indicate that the user is terminated. Generally, it's not a good...
View ArticleRe: importing digicert SSL Certificate error
Hi Tapan, Thanks for Replying.after your reply i try to regenerate CSR and PSE files with sapgenpse get_pse -p SAPSSLS.pse -x psepin -r webdisp.req "CN=company.co.uk, OU=my company, O=company name...
View ArticleCreating Sub-CAs in SSO Server with additional key usages
Hello! We currently using the SSO Server SP3 version. Our Network department wants us to issue certificates that have additional key useges (also exteneded) that are not currently offered in the...
View ArticleProfessional user and Limited types
Hi All, While administering SAP users, it is quite easy to make mistakes in assigning user rights thus leading to over usage.If every user is Professional, then there is no worry.When collecting views...
View ArticleRe: Professional user and Limited types
The numbers collected in the licence audit are compared to each customer's contract. It has to be that way. Not all customers use just the standard licence types, and the boundaries between the types...
View ArticleLogfiles for service/https/acl_file
Hello, we're securing port 50013, SAPMMC etc by setting profile parameter service/https/acl_file to the path, where our service_acl file is stored.A few of our servers have got more than one IP address...
View ArticleRe: Places where an userID is used
I agree Marin points . However , in my view below is the way to check any user is configured in RFC or Batch jobs. - Extracting log from SM19 to find out users configured in RFC-You can check this...
View ArticleRe: GUI Scripting - Blocking The Recording
There is no standard profile parameter to restrict the 'recording' only option for users. Mostly IT ,SAP consultants only technically know about this scritpting and will be using it. Users should have...
View ArticleRe: UME Security - Java Scheduler 'Action' authorization
Thanks Malte, this like is really useful! I not only book marked it but printed the page to PDF and saved it on my google drive! Definitely a keeper! Thanks again,Yannick C.
View ArticleRe: Archived logs in SCU3
Without marking the 'Archived Logs' check box , Did you get the result of change logs? Try SLG1 if you could get more detail about this error. Thanks,Krishna
View ArticleHow to schedule sending of security optimization report
Hello Guru!We have Solution Manager 7.0.1 (SAPKITL441).I configured security optimization self-service and got the analysis report. All work as expected.But now I need to automate this process, I...
View ArticlePurchasing users only allow to maintain costing data engring team only allow...
Hi All, I have requirement. We now have a requirement from the business teams (purchasing and engineering) to ensure both teams are assigned separate authorization roles/objects to make sure purchasing...
View ArticleRe: Purchasing users only allow to maintain costing data engring team only...
How are they accessing the data? Transaction (which ones?), direct table maintenance etc. Your answer to the above will guide any recommendations.
View ArticleRe: Purchasing users only allow to maintain costing data engring team only...
Sarvana,If it is direct table maintenance , I prefer to go for custom tcode set up which can be used to modify the data of the table. Using transaction variant (SHD0) , You can build a two separate...
View ArticleRe: Creating Sub-CAs in SSO Server with additional key usages
Hello Kent Unfortunately, I did not understand your requirement. Can you please elaborate it a bit? Cheers,Tapan
View ArticleQuery on authorization objects an their classifiacation
Hi every one, Here am with sap security related query about authorization objects and their classification.how these authorization objects classified in a single object class?.How they are picking...
View ArticleRe: Query on authorization objects an their classifiacation
I suggest you to go through ADM940 course or help.sap.com or Google to find the answers in detail. - Each authorization object must be part of authorization class , can be viewed it in SU21...
View Article