It is possible to analyse what data a user accessed via an SAP standard...
Hi Experts, it is possible to analyse what data a user accessed via an SAP standard transaction over the last couple of months, eg. PA20 ..what HR data was accessed. ThanksKiran.GVL
View ArticleRe: Create certificate with Signature Algorithm "SHA1"
Yes, creating the request on a other (NW7.31 release) system is a good work-aroundwe already tried. After importing the signed certificate in the target system(NW7.11 release) the connection works....
View ArticleRe: Auto generated role profiles vs custom naming convention
Hi Martin, Thanks for the reply, i did try like your self to check out any topics around this subject, but again came up with nothing. My preference is not to use custom profile names as it could limit...
View ArticleRe: It is possible to analyse what data a user accessed via an SAP standard...
Hi Kiran,I think you can use TX. STAD (SAP Workload: Business Transaction Analysis) to look for the information that you require. Hope it helps! Cheers!
View ArticleRe: Can someone let me know about an external security product which is FIPS...
FIPS 140-2 certification of SAP's own cryptolib is pending but I'm sure they will get it before the year is over, you could just use that. See SAP note 1848999 for details. There is standard support...
View ArticleRe: It is possible to analyse what data a user accessed via an SAP standard...
Hi, by default no. The access is not logged. Maybe you are already using security audit SM19 but that just tells you that user executed transaction. SAP has a new product which should address your...
View ArticleRe: Auto generated role profiles vs custom naming convention
Hi, that note describes one scenario where custom profile names used to be necessary. It also describes how to solve this and still use generated profile names. So I can't think of any scenario where...
View ArticleRe: Create certificate with Signature Algorithm "SHA1"
Hi Joost, this is a long shot but it may be useful for you. I disassembled jar that implements keystore for Java AS. You can find Jave code there like if (signKey.getAlgorithm().equals("DSA"))...
View ArticleRe: "Accepting Credentials not available!" Error
It would be really great if you actually posted the solution to the problem so others can benefit.
View ArticleRe: Password logon no longer possible - too many failed attempts
I dont get a email with license... what can i do?
View ArticleRe: Create certificate with Signature Algorithm "SHA1"
Another option is to use the external tool sapgenpse that is provided with the SAP Cryptographic Library to generate the keys/certificates. In NWA you can import externally generated keys/certificates....
View ArticleRe: throwUserLoginException / throwNewLoginException
Sorry for bringing up such an old thread, but how did you solve your problem?
View ArticleDownload SAP Notes on Background
Hello forum, I found interesting to add that post on security forum to know your feedback, Inspired about suggest new functionality for SAP Solution Manager (that idea is valid for any ABAP stack SAP...
View Articledoes SAP upgrade cover prievious security notes.
Hi, i am beginner in security field and have this confusion. I am using Solution Manager to find out missing security notes from my system. Should i filter the result and implement security notes that...
View ArticleAuthorization control for profit center values in profit center reports
Hi, Can anyone let me know how to get the authorization control with that of the profit center values for the below mentioned T-codes...We tried to get the authorization control for the below mentioned...
View ArticleRe: Authorization control for profit center values in profit center reports
Hi Kanna, Can u be little specific. Do u want to check authorization on these t-codes for users before they execute report.
View ArticleRe: Authorization control for profit center values in profit center reports
Hi, have you check this note: 1462516 Authorizations: Profit centers / groups Regards,Cristiano
View ArticleRe: IGS-Call of RFC-FM PIGFARMDATA fails due to unknown missing Authorization
'Aight, mystery solved. The error reoccured and after some more tracing with the respective tools it hulked up to be a failed registration-service (wasn't restarted) against an instance of the...
View ArticleRe: does SAP upgrade cover prievious security notes.
Hi Abdul If you are updating patches frequently in system new patches contains all these notes. If a security note is high priority you need to update this manually. You can get more information from...
View ArticleHow Security design can effect the performance of SAP System
Dear experts , We have a landscape where we have Business one ,xrpm ,BO etc ssytem and have a role design where techincal role are separated from org roles (Enabler role concept ) which means when a...
View Article