SAP Security Interview Questions
SAP Security Interview Questions
SAP Security Interview Questions
Q. Tcode /SAPAPO/SDP94
In the planning book screen, certain buttons are missing when using tcode /SAPAPO/SDP94. Neither
the “Selection Window” nor the “Display Dependant Objects” buttons are visible.
A: Maintain C_APO_FUN to have C_SELCTION, C_SELE and C_SELORG on field APO_FUNC and
the name of the planning area on APO_PAREA to make sure /SAPAPO/SDP94 is fully functional and
viewable.
Q. Table names
What is the table name which houses the full list of activities? (01 change, 02, 03 display, etc…)?
A: The table is TACT. Possible activities for one authorized object is: TACTZ.
The list of additional activities is extensive. Go to the profile generator/authorizations screen, pick up
any autho object and get to the selection screen for possible activities. Right click and you will see
“More values – F7” for a complete list of activities.
Note: May not work for all “activity” fields. In the field for F_REGU_BUK, for example, the values are
kept are in a pull-down menu in the transaction F110.
Q. Accidental deletions
Users in our system were deleted when they shouldn’t have been. To determine how this happened,
can I retrace the function or is it logged on a table?
A: Debug or use RSUSR100 to find the information.
Q. Accidental deletions 2
While working in development server, my session was deleted by another user. Is there a way to find
the user that deleted it, the system number and the related data?
A: Try using TX STAT (or STAD, depends on release) and look for someone who has used TX SM04.
With that, you can kill the session. If more than one user has used the same tcode at the given time,
SM21 has the entry logged for it.
You can find who ran SM04 and delete that user’s session.
Q. Conflicting combinations
How do you find the typical conflicting combinations of authorization objects in HR, like conflicting
tcodes, infotypes and clusters?
A: If you are looking for conflicts within HR, there aren’t many. Some companies use security
measures to limit payroll information, update disciplinary actions, promotion potential and medical to
specific individuals. It is not done with tcodes, but with limited Info types.
SAP HR is written as a central set of tcodes with access limited by data.
The main tcodes are PA40, PA30 and PA20, HR org management is the PA10, PA03, PA13 or the
POME and “run Payroll”.
Concentrate on the Info types not necessarily the tcodes not objects as they all use P_ORGIN (or
what you configure). The only anomaly is P_ABAP which can override P_ORGIN.
Q. Authorization reports
How are authorization reports generated? The reports should include activity by object and be
accessible to all users with access.
A: Run SUSR_SYNC_USER_TABLES and then try tcode SUIM/report RSUSR002. Enter your object
in Object 1 and press enter. Follow the prompts.
Q. Movement types
How do you restrict users on Movement types and certain storage locations in transaction MB1B? The
only object displayed in SU24 for MB1B, with a combination of Movement type and Storage location,
is M_MSEG_LGO. How do we enable the system to check this object in MB1B? Or, how can we
restrict users on a combination of Storage location and Movement type in transaction MB1B?
A: Storage location must be configured to check authorization on each storage location. SAP does
not do this by default so there is no ST01 trace of it until you configure it. This is done in the IMG
(tcode SPRO).
If you get the help documentation of M_MSEG_LGO (using SU21), there is a link with the correct
customizing tcode which turn on/off the authority check on it (under material management-stocks).
This works only for good movements, not for display stocks content.
Q. Login/disable_multi_gui_login
Will activating parameter login/disable_multi_gui_login affect workflow?
A: No, the key is the GUI in the parameter. Workflow does not initiate a GUI logon but a logon in the
“background” or via RFC to a non-GUI display session.
Q. Expert mode
What is the Expert mode in Profile generation? What are the options for its use?
A: Expert mode merges existing authorizations with new auths as they are added to the role. The
auths display tells you which authorization objects have been added or changed. This is a time-saver
in that it clearly lists changes and what to maintain.
Note: Always work in Expert mode.
Q. Mention what are the pre-requisites that should be taken before assigning Sap_all to a user
even there is an approval from authorization controllers?
Pre-requisites follows like
1. Enabling the audit log- using sm 19 tcode
2. Retrieving the audit log- using sm 20 tcode
Q. Explain how you can delete multiple roles from QA, DEV and Production System?
To delete multiple roles from QA, DEV and Production System, you have to follow below steps
1. Place the roles to be deleted in a transport (in dev)
2. Delete the roles
3. Push the transport through to QA and production
This will delete all the all roles
Q. Explain what things you have to take care before executing Run System Trace?
If you are tracing batch user ID or CPIC, then before executing the Run System Trace, you have to
ensure that the id should have been assigned to SAP_ALL and SAP_NEW. It enables the user to
execute the job without any authorization check failure.
Q. Mention what is the maximum number of profiles in a role and maximum number of object
in a role?
Maximum number of profiles in a role is 312, and maximum number of object in a role is 150.
Q. What is the t-code used for locking the transaction from execution?
For locking the transaction from execution t-code SM01, is used.
Q. Mention what is the main difference between the derived role and a single role?
For the single role, we can add or delete the t-codes while for a derived role you cannot do that.
Q. Mention which t-codes are used to see the summary of the Authorization Object and Profile
details?
1. SU03: It gives an overview of an authorization object
2. SU02:It gives an overview of the profile details
Q. Mention what SAP table can be helpful in determining the single role that is assigned to a
given composite role?
Table AGR_AGRS will be helpful in determining the single role that is assigned to a given composite
role.
Q. What is the parameter in Security Audit Log (SM19) that decides the number of filters?
Parameter rsau/no_of_filters are used to decide the number of filters.
Q. How to generate the list of roles having authorization objects with status as “maintained”•?
This list can be generated by using the table AGR_1251 as below:
Execute the t-code SE16
Enter the table name as AGR_1251 and hit enter button
Enter the field value as “G” in field “Object Status” and click on execute
The same table can be used to generate the list of roles with authorization objects having status
modified and manual with field values M and U respectively.
Q. How to find the email ids if given a list of users (say 100)?
The list of email ids for given users can be generated by performing the below steps:
1. Execute the t-code SE16
2. Enter the table name as USR21.
3. Upload the list of users using multiple selection option and execute. This will give us the list of users
and their respective person numbers
4. Extract this data to excel sheet
5. Now, go back to SE16 and enter table name ADR6
6. Upload the list of person number extracted from table USR21 and execute
7. Now, table ADR6 will give us the list of person numbers and their email ids.
8. Download the list in excel and perform V-look up in excel to map the email ids of users with their
SAP IDs
Q. How to find user defined, system default values for security parameters?
The values for parameters can be checked by using the t-code RSPFPAR. After executing the t-code,
given the parameter name and click on execute.
Q. How to assign the logical system to client?
Logical system can be assigned to client by using the t-code SCC4. We need to be very careful while
doing this change as it can affect the CUA (if configured).
Q. Which entities are not distributed while distributing the authorization data from master role
to derived roles?
During the distribution of authorization data from master role to derived roles, Organizational values
and user assignment are not distributed. The Org. values and user assignments are specific to
individual roles hence has no bearing on master-derived role relationship.
Explore SAP Security Sample Resumes! Download & Edit, Get Noticed by Top
Employers!Download Now!
Q. How to assign the multiple roles to more than 20 users in one shot in t-code SU10?
To perform this mass role assignment, we need to follow below steps in SU10:
1. In SU10 home screen, click on the button “Authorization Data”•
2. This will take to the new screen similar to screen in t-code SUIM -> User by complex search criteria.
Enter the search criteria for users needed to be changed in SU10 and execute the same
3. Once the list of users is reflected, click on “select all” button on left top corner of the list and click
on “Transfer”• button. This will take us back to SU10 screen with all the selected users in users
4. Now, click on select all button in SU10 home screen and then click on change button.
5. Above step will take us to the next screen where you can perform the role assignment as in normal
case of SU10 t-code
Q. What is the use of ST01? What are the return codes of t-code ST01
Transaction code ST01 is used to trace the user authorizations. This can be useful if we need to check
which all the authorizations have been checked in background when any t-code is being executed by
the business user.
0 – Authorization check passed
1 – No Authorization
2 – Too many parameters for authorization check
3 – Object not contained in user buffer
4 – No profile contained in user buffer
6 – Authorization check incorrect
7,8,9 – Invalid user buffer
Q. Is there a table for authorizations where I can quickly see the values entered in a group of
fields?
In particular I am looking to find the field values for P_ORGIN across a number of authorization profiles,
without having to drill down on each profile and authorization. AGR_1251 will give you some
reasonable info.
Q. How can I do a mass delete of the roles without deleting the new roles ?
There is a SAP delivered report that you can copy, remove the system type check and run. To do a
landscape with delete, enter the roles to be deleted in a transport, run the delete program or manually
delete and then release the transport and import them into all clients and systems.
It is called: AGR_DELETE_ALL_ACTIVITY_GROUPS. To used it, you need to tweak/debug & replace
the code as it has a check that ensure it is deleting SAP delivered roles only. Once you get past that
little bit, it works well.
Q. Someone has deleted users in our system, and I am eager to find out who. Is there a table
where this is logged?
1. Debug or use RSUSR100 to find the info’s.
2. Run transaction SUIM and down its Change documents.
Q. What authorization are required to create and maintain user master records?
The following authorization objects are required to create and maintain user master records:
1. S_USER_GRP: User Master Maintenance: Assign user groups
2. S_USER_PRO: User Master Maintenance: Assign authorization profile
3. S_USER_AUT: User Master Maintenance: Create and maintain authorizations