Re: PFCG restriction: how to restrict security team from self assignment of...
Hi Vijay Restrict the security group by a assigning to a auth group with the object S_USER_GRPwith values 22 and 78 and class (auth group) Cheers Pavan M
View ArticleRe: PFCG restriction: how to restrict security team from self assignment of...
Yes thats true, but that will not enable my peer who is in same grp to assign a role to me. Hence this solution will not work. I should be able to assign role to my peer who is in same grp or vice...
View ArticleRe: user validity expiring notification should come while login by user?
Hope this document will guide you to achieve what you are looking for.. http://scn.sap.com/docs/DOC-50952
View ArticleRe: PFCG restriction: how to restrict security team from self assignment of...
Using the standard concept you'll have to get creative with your S_USER_GRP and a supporting set of roles. This will have a maintenance overhead. A couple of alternatives are: 1. Have someone outside...
View ArticleRe: Weak SSL Cipher
Hi Martin, Thank you. One thing I don't understand, why only this port is giving this weak cipher issue. We have ssl enabled which means it will be effective for all ports. We have standard 443 https...
View ArticleRe: user validity expiring notification should come while login by user?
Hi Dayanand, Thank you so much your rapid and appropriate replay, I will try to implement as per your document solutions and let you know if I can achieved. Regards,Suresh B
View ArticleRe: Structural Authorisations - Connection to It0105
Hi Niels, Thanks you for the reply, In answer to some of your ideas For the 2nd user ID there is NO personnel number of any kind, the ID has just been attached to a position number that is only related...
View ArticleRe: Weak SSL Cipher
Then sapstartsrv is not behaving the same way as ICM is, sounds like a bug to me. I guess sapstartsrv is not even respecting the ssl/ciphersuites parameter.
View ArticleRe: Weak SSL Cipher
Hi, I still believe that leaving it as is is a better option than disabling HTTPs connection. I know that it will "resolve" one of your issues but it's not right. It's just dump following of...
View ArticleRe: Hide sensitive attribute data and make the infoobject unavailable to some...
Hi Linda,I have the same issue now and just wondering if the issue was fixed?could you please share your solution? thanks RegardsJia
View ArticleRe: PFCG restriction: how to restrict security team from self assignment of...
Guys, can you please looki into it. Anybody who has come across this scenario? Looking forward for your reply.
View ArticleRe: user validity expiring notification should come while login by user?
Hi Dayanand,I have implemented the component enhancement and it is working fine, Thank you.Regards,Suresh B
View ArticleRe: PFCG restriction: how to restrict security team from self assignment of...
Vijay - I dont believe that there is a technical solution by using the SAP Authorisation concept for this. We have controlled this scenario by embedding the Firefighter tool. In summary, the Security...
View ArticleRe: PFCG restriction: how to restrict security team from self assignment of...
Hi, as I mentioned, you will have to build a set of roles and authorisation groups that allows this segregation. Unfortunately that will mean creating auth groups and roles for each user and will...
View ArticleRe: What is the use of coupled T-code in SAP?
Hi Jana Refer to SAP Note 358122 - Function description of transaction SE97 and also please go through to the discussions TCDCOUPLES in SCN. CheersPavan M
View ArticleAnalysis of Authorisations
Hi, I understand that SUIM is available to answer most related security questions, but does anyone know how I could determine which ABAP programs, classes, function modules etc are reading what...
View ArticleRe: Analysis of Authorisations
There is no such table in SAP. Your next closest bet would be USOBT_C for object S_TABU_* objects but that is only as good as what the proposals for transactions etc are maintained, and they are...
View ArticleRe: Analysis of Authorisations
Hi, as Julius mentioned you have to go through the code. If you don't want to/can't use 3rd party products then there is a simple approach of using SE11 for a DB table and use Where-used function. The...
View ArticleRe: Analysis of Authorisations
Many thanks for you responses, they have been really helpful
View Articlecreate single role copy of composite role in sap security
We have a composite role Z_RUC_ALL_FICO_PAAKAYTTAJA. It includes dozens of single roles ( Approx: 30 single roles). We would need to create a new single role which includes all transactions and...
View Article