Security Questions
Security Questions
>2) What is the use of transaction PFUD at midnight? >3) Is PFUD needed when saving in SU01 and does the user need to logoff and on again after changes? >4) How are web services represented in authorizations of users who are not logged on? >5) How do you force a user to change their password and on which grounds would you do so? >6) What is the difference between SU24 and SU22? What is "orginal data" in SU22 context? >7) When an authorization check on S_BTCH_JOB fails, what happens? >8) Can you have more than one set of org-level values in one role? >9) Should RFC users have SAP_NEW and why? >10) What is an X-glueb command and where do you use it in SAP security? >11) What is the disadvantage of searching for AUTHORITY-CHECK statements in ABAP OO coding and how does SU53 deal with this? >12) In which tables can you make customizing settings for the security administration and name one example of such a setting which is usefull but not SAP default? >13) Can you use the information in SM20N to build roles and how? >14) If the system raises a message that authorizations are missing but you have SAP_ALL, what do you do? >15) Name any one security related SAP note and explain it's purpose or solution. >16) What are the two primary differences between a SAML token profile and a SAP logon ticket? >17) Where do you configure the local and global settings of the CUA and what are the consequences of inconsistent settings? >18) If you have users in different systems with different user ID's for the same person, what are your options to manage their authorizations centrally? >19) Explain the use of the TMSSUP* RFC destinations and the importance of the
domain controller? >20) Why should you delete SAP_NEW profile and which transaction should you use before doing so? >21) What is meant by the last sentence in SAP Note 587410 and how do you restrict it? >22) A key-user in the finance department is also an ABAP developer. What do you do? >23) A new ABAP developer short dumps regularly in production while reading business data. What do you do? >24) You are confident with SAP standard, but there are also custom and partner products in your system. How do you check them for "low brainer" security issues? >25) How do you remove a developer's access and developer keys from a system? What else would you check for? > 26) How do you transport user groups from transaction SUGR? Does this impact the "Groups" tab in SU01 and if so, then what should you check beforehand? > 27) When you record a transport request in PFCG for a role and then change the role before releasing the transport request, does the transport include the changes or not? Is the answer documented anywhere in the system? > 28) Describe a scenario under which you would update a SAP table directly, and which precautions you would take? > 29) Is there a difference between transactions SE09 and SE10 and what is the use of any differences? > 30) The visibility of tabs in the Solution Manager "work centers" seems to follow it's own logic for different users with the same roles and menus in the work centers differ from user to user. The ST01 trace only shows S_GUI as being checked. How do you proceed to restore your sanity?