Quantcast
Channel: SCN: Message List - Security
Browsing all 5338 articles
Browse latest View live

Re: PFCG restriction: how to restrict security team from self assignment of...

Hi Vijay Restrict the security group by a assigning to a auth group  with the object S_USER_GRPwith values 22 and 78 and class (auth group) Cheers Pavan M

View Article


Re: PFCG restriction: how to restrict security team from self assignment of...

Yes thats true, but that will not enable my peer who is in same grp to assign a role to me. Hence this solution will not work. I should be able to assign role to my peer who is in same grp or vice...

View Article


Re: user validity expiring notification should come while login by user?

Hope this document will guide you to achieve what you are looking for.. http://scn.sap.com/docs/DOC-50952

View Article

Re: PFCG restriction: how to restrict security team from self assignment of...

Using the standard concept you'll have to get creative with your S_USER_GRP and a supporting set of roles.  This will have a maintenance overhead.  A couple of alternatives are: 1. Have someone outside...

View Article

Re: Weak SSL Cipher

Hi Martin, Thank you. One thing I don't understand, why only this port is giving this weak cipher issue. We have ssl enabled which means it will be effective for all ports. We have standard 443 https...

View Article


Re: user validity expiring notification should come while login by user?

Hi Dayanand, Thank you so much your rapid and appropriate replay, I will try to implement as per your document solutions and let you know if I can achieved.  Regards,Suresh B

View Article

Re: Structural Authorisations - Connection to It0105

Hi Niels, Thanks you for the reply, In answer to some of your ideas For the 2nd user ID there is NO personnel number of any kind, the ID has just been attached to a position number that is only related...

View Article

Re: Weak SSL Cipher

Then sapstartsrv is not behaving the same way as ICM is, sounds like a bug to me. I guess sapstartsrv is not even respecting the ssl/ciphersuites parameter.

View Article


Re: Weak SSL Cipher

Hi, I still believe that leaving it as is is a better option than disabling HTTPs connection. I know that it will "resolve" one of your issues but it's not right. It's just dump following of...

View Article


Re: Hide sensitive attribute data and make the infoobject unavailable to some...

Hi Linda,I have the same issue now and just wondering if the issue was fixed?could you please share your solution? thanks RegardsJia

View Article

Re: PFCG restriction: how to restrict security team from self assignment of...

Guys, can you please looki into it. Anybody who has come across this scenario? Looking forward for your reply.

View Article

Re: user validity expiring notification should come while login by user?

Hi Dayanand,I have implemented the component enhancement and it is working fine, Thank you.Regards,Suresh B

View Article

Re: PFCG restriction: how to restrict security team from self assignment of...

Vijay - I dont believe that there is a technical solution by using the SAP Authorisation concept for this. We have controlled this scenario by embedding the Firefighter tool. In summary, the Security...

View Article


Re: PFCG restriction: how to restrict security team from self assignment of...

Hi, as I mentioned, you will have to build a set of roles and authorisation groups that allows this segregation.  Unfortunately that will mean creating auth groups and roles for each user and will...

View Article

Re: What is the use of coupled T-code in SAP?

Hi Jana Refer to SAP Note 358122 - Function description of transaction SE97 and also please go through to the discussions TCDCOUPLES in SCN.  CheersPavan M

View Article


Analysis of Authorisations

Hi, I understand that SUIM is available to answer most related security questions, but does anyone know how I could determine which ABAP programs, classes, function modules etc are reading what...

View Article

Image may be NSFW.
Clik here to view.

Re: Analysis of Authorisations

There is no such table in SAP. Your next closest bet would be USOBT_C for object S_TABU_* objects but that is only as good as what the proposals for transactions etc are maintained, and they are...

View Article


Re: Analysis of Authorisations

Hi, as Julius mentioned you have to go through the code. If you don't want to/can't use 3rd party products then there is a simple approach of using SE11 for a DB table and use Where-used function. The...

View Article

Re: Analysis of Authorisations

Many thanks for you responses, they have been really helpful

View Article

create single role copy of composite role in sap security

We have a composite role Z_RUC_ALL_FICO_PAAKAYTTAJA. It includes dozens of single roles ( Approx: 30 single roles). We would need to create a new single role which includes all transactions and...

View Article
Browsing all 5338 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>