New functionalities in SU25
Hi, We are hitting SAP_BASIS 740 version as effect SU25 has been enhanced with added functionalities. Can I get details for these two options and when it is supposed to be used? Thanks,Krishna
View ArticleRe: How to monitor the transactions executed by user?
Dear Shaji, Thanks for the step to enable the security audit log. I have to trace all the user with transaction in PRD system for one year. Can you please guide me how to do this. Regards,Raj
View ArticleRe: How to monitor the transactions executed by user?
Dear Maheswaran, I have to trace the user with all TCode in PRD system for one year. Can you please let me know the step - what are the parameter I have to add. Regards,Raj
View ArticleRe: User XYZ has no authorization for tp command IMPORT
...as Martin suggested already earlier: use the debugger... I had a similar case today, where a dedicated user had to be locked out from the possibility to modify coding in SE38, and that was done like...
View ArticleRe: How to prevent user from accessing a a specific field in a table?
Hi In standard there is no common authorization check against table column.It depends from program code.You can create your own Z* to achieve this. Another approach is to use some kind of gateway...
View ArticleRe: How to prevent user from accessing a a specific field in a table?
You can also think about using SHD0 Transaction/Screen Variants. Allows you to hide table columns.
View ArticleAuthorization object conflicts in a user profile
We have a requirement where we need to maintain different values of the same authorization object in two different roles for the same user. The requirement is for a user to have ability to display...
View ArticleRe: Authorization object conflicts in a user profile
Hi, are you sure that the user isn't getting this from somewhere else? Role 1 + Role 2 will (in your example) give display/03 all and change/02 only V, the authorisations will not combine to give...
View ArticleRe: Authorization object conflicts in a user profile
Thank you for your response Alex.You are right,the user is getting it from another role which has authorizations like this. Role 1 : Z:_MM02Auth Object : M_MATE_STAACTVT 02STATM V Role 2 :...
View ArticleQuiz: understanding security policies in SAP (SECPOL)
Scenario:Imagine your SAP system (1 application server) is running with the following system profile parameter settings (RZ10): Kernel default values:login/min_password_digits = 0login/min_password_lng...
View ArticleAn User have an error in accessing company codes.
Hi All, I am new the SAP Security, can any one tell me an user who is having access to company codes but also unable to process the reports which he needs to generate it. What are the things I need to...
View ArticleRe: An User have an error in accessing company codes.
Dear Revanth company code is BUKRS, go to PFCG, add tcodes, change authorisation clicking "change authorisation data" by modifying BUKRS values. Regards Prabodh
View ArticleRe: An User have an error in accessing company codes.
User should use tr. SU53 to verify, which authorization objects are missing. You can use also use tr. ST01 to do carry out an authorization trace.
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
It depends on whether it is a new installation of 7.31 or higher, or an older installation which has been upgraded. If login/password_compliance_to_current_policy has it's default, then all of the...
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
Hi,Answer - 4.Instance profile takes precedence and along with Sec policy.Thanks.
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
Hi Julius, thanks for sharing your thoughts. I do not want to make the quiz more complicated, but in real life you are right and these things need to be considered too. Concerning your input I want to...
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
Hi, sorry, but your answer is not entirely correct. Best regardsStefan
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
More questions.. :-) Is the behaviour only for SU3 and the user is authorized for the debugger or meant is only F5 (change password) on the logon screen regardless of their other authorizations and...
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
Hi Julius, sorry, but your answer is not correct. There is only one application server available in that system and IT employees only have display rights assigned (without debugger access). Best...
View ArticleRe: Quiz: understanding security policies in SAP (SECPOL)
Ah, I got it! No passwords are being changed because all the IT employees have left the company because of the password rules? ;-) Just joking - I am going to have to pass here then and go back to...
View Article