Quantcast
Channel: SCN: Message List - Security
Browsing all 5338 articles
Browse latest View live

Re: Issues with Analysis Authorization checks in APO

have the RSD1 characteristics been compared to check they are are same in both systems Also, AAs have 3 mandatory characteristics (within BI system 7.4 release it did)0TCAACTVTActivity in Analysis...

View Article


Re: Issues with Analysis Authorization checks in APO

Hi Colleen, Thank you for your response..Yes, RSD1 characteristics are the same across both systems.Also, the other Characteristics have been maintained too (same in both systems). I also tried looking...

View Article


Re: Issues with Analysis Authorization checks in APO

Hi All, If it helps, in Quality: the Authorization checks are listed as: Subselection (Technical SUBNR) 1while in Production it checks Subselection (Technical SUBNR) 1 in one place, however where it...

View Article

Re: Archivelink Signature Public Exponent

I do not have access to any system at the moment but if you see a cert that is used for signing by Archivelink then you should be able to export it from STRUST. Please check SAP doco. Cheers

View Article

Audit log of customized table.

Dear experts, I need to trace log of some tables. In spro transacction there is one customize transacction KEDE. This transacction is used to define derivation rules and generates entries with tables...

View Article


SAP Business Objects Password Expiry

Can anyone please assist with this issue: We currently have a SAP BOBJ 4.1 environment which is internet facing which authenticates via our BW 7.3 which is in the LAN. The issue arises when the...

View Article

Re: SAP HR Security

You could also use eCATT and this could be transported&tested in Dev-QA-Prod stages too. IMHO you have more control using eCATT.Both eCATT and LSMW are not really to be used in production. Did...

View Article

Re: Archivelink Signature Public Exponent

This procedure explains how to selet a certificate:Selecting Certificates - System Security - SAP Library After selecting you can export it. The following procedure explains how to import a...

View Article


Re: PFCG Current version not generated

Did you try generating the profile? Generating Authorization Profiles - Identity Management - SAP Library

View Article


Image may be NSFW.
Clik here to view.

Re: PFCG Current version not generated

Hi Jay, I think u might haven't generated the profile or may not have maintained the authorization data.Check once whether any open fields are there are not. Herewith is the attached error for your...

View Article

remove value from f4 search based on authorization

As we have multiple company code and other configuration related to it, we want to restrict the user not to view any different company code or other values related based on role and authorization, how...

View Article

Re: SAP HR Security

Thank you Pradeep and Peter for bringing more information in this subject on my way.That is helpful for me. Regards Girish Almiya

View Article

Re: remove value from f4 search based on authorization

Hi, speak to your development team about using search help exits.  Documentation is here: Search Help Exit -  ABAP Dictionary - SAP LibraryCheers

View Article


SAP WM Cycle counting

Hi, We have configured Cycle counting process for Physical Inventory in WM. That is working good.our Key users are Feeling difficulty to identify when particular material is to be Physical...

View Article

Re: How to find out which queries are being used ?

Hi, It's been a while since I've done this but one method is to use ST03N & look for the execution of programs with an AQ* prefix.  The general structure is AQZZ/<query user group><query...

View Article


Re: Archivelink Signature Public Exponent

Thanks, I managed to export the certificate.I am trying to extract some information from the certificate.

View Article

Re: List of Users against their Inbox documents

Hello, Could anyone please tell me how to check what kind of documents are attached in user's inbox? Thanks,Pavan

View Article


JCo and SNC

Hi, I want to build my own JCo client and secure it using SNC. The client can connect without SNC, so the basic setup should be good. I do have first of all a basic question how it is supposed to work:...

View Article

Influence about system performance by RAL, SAL

Hi, Experts.My team are going to use RAL(Read Access Log) and SAL(Security Audit Log)for logging users access to sensitive data.To meet the compliance, we have to log users' activity informationas...

View Article

Re: Influence about system performance by RAL, SAL

Hi, I have been through measurement exercises in the past for SAL and have found no measurable performance influences.  The only factor we could measure was log growth (which is very dependent on what...

View Article
Browsing all 5338 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>