InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which reports or programs are useful for regenerating SAP_All profiles? |
|
Answer» Report RSUSR406 or T-code SU21 can be used to manually regenerate the SAP_ALL PROFILE. In this case, the SAP_ALL profile is only generated in the client where the report is EXECUTED. You can ALSO generate SAP_ALL profiles using the report AGR_REGENERATE_SAP_ALL. In this case, the SAP_ALL profile is generated in all the CLIENTS. |
|
| 2. |
Mention what is the maximum number of profiles in a role and a maximum number of objects in a role? |
| Answer» | |
| 3. |
State difference between role and profile. |
|
Answer» A ROLE is essentially a combination of transactions and authorizations stored in a profile. PROFILES associated with a role can vary in number DEPENDING on the number of transactions and authorizations that are contained within the role. As soon as you generate a role, it automatically CREATES a profile. |
|
| 4. |
Explain the use of role templates. |
|
Answer» As part of SAP AIF (Application Interface Framework), predefined template roles are AVAILABLE. These role templates can be used to define or customize roles based on SPECIFIC requirements. Each role template comes with a set of authorizations that typical SAP AIF users would REQUIRE. You can change a role template in three ways:
Below are some examples of role templates offered by SAP AIF 4.0:
|
|
| 5. |
How will you create a user group in SAP? |
|
Answer» The following STEPS explain how to create a user GROUP in SAP:
|
|
| 6. |
What is SOD (Segregation of Duties) in SAP Security? |
|
Answer» Segregation of Duties (SOD) refers to segregating duties or roles between different users. SOD involves separating individuals who handle different steps of business transactions in order to reduce fraud and errors. The SAP SOD is an essential internal control system meant to minimize the risk of errors and irregularities, identify problems and ensure the onset of remedial action. All of this can be achieved by making sure that no single person controls all phases of the transaction. Example: Let's say that the process of disbursing the money is preceded by a series of steps. As a FIRST step, a business MANAGER generally drafts a purchase order (PO) that outlines how a vendor will be paid for the product or service. That vendor must be approved by the purchasing department before payment can be made. A senior manager will usually approve the purchase order. An invoice for products and services must then be ISSUED by the vendor. Prior to signing a check, a person from the accounts payable department needs to approve the invoice. The following diagram illustrates the basic procurement process. In the diagram, there are four people with different responsibilities. In this workflow, all four people act as CHECKS on each other. Imagine if one person could carry out all four steps of this process, then he or she would be capable of requesting a purchase, approving it and signing the check. It has unfortunately been observed that employees can misuse this concentration of authority to commit fraud. This emphasizes the importance of segregating duties. |
|
| 7. |
Is there a way to add a missing authorization? |
|
Answer» SU53 is the best T-code to find the authorizations that are missing. There MAY be TIMES that this T-code is REQUIRED for SAP GUI troubleshooting. We can then insert those missing authorizations with the T-code PFCG. PFCG is the T-code for maintaining roles and authorization DATA. |
|
| 8. |
Write different types of roles in SAP security. |
|
Answer» In SAP, there are several types of roles as follows:
|
|
| 9. |
Explain the concept of SAP Roles and Authorization. |
|
Answer» In SAP, ROLES and authorization are the mechanisms that allow users to execute transactions (execute programs) in a secure way. Each role in SAP requires authorization in order to execute a function. There are several different types of standard roles in SAP for different modules and scenarios. In ADDITION, user-defined roles can be created based on the PROJECT scenario. The SAP SYSTEM GRANTS access to users based on roles stored in their user master. PFCG is the T-code for maintaining roles and authorization data. |
|
| 10. |
How will you check table logs and what T-codes will you use? |
|
Answer» The FIRST THING we need to do is make sure that logging is enabled or not for this table, and we can check this by using the T-code SE13. Then, if the table loggings are enabled, we can VIEW the HISTORY of the table (table logs) by using T-code SCU3. |
|
| 11. |
How many types of users are there for background jobs? Is there a way to troubleshoot problems that a background user faces? |
|
Answer» The user types for background jobs are as follows:
We can schedule background jobs using the SM36 T-code, VIEW and monitor background jobs running in the system using SM37 T-code, and troubleshoot PROBLEMS for background users using ST01 T-code. |
|
| 12. |
Describe the different types of SAP System users. |
|
Answer» In SAP systems, when an ADMINISTRATOR creates a new user ID, he has to specify the TYPE of user this user ID should be assigned to. Users in a system can be categorized according to their purposes. This allows different security policies to be specified for different types of users. A security policy may, for example, specify that a human user (end-user) who executes tasks interactively needs to change their passwords regularly, whereas this requirement does not apply to users who are running jobs in the background. Following are some types of users in SAP:
|
|
| 13. |
What are different SAP Security T-codes? |
||||||||||||||||||||||||||||||||||||||
|
Answer» In SAP, a TRANSACTION code (T Code) is basically a four-digit shortcut KEY that can be used to access a specific function or any running program in the SAP application. Using a transaction code, you can access desired functions directly within the SAP system. In the SAP system, there are more than 10,000 T-codes used for configuration, end-user ACTIVITIES, implementation, reporting, updating, security, etc. Below is a list of some SAP Security T-codes:
|
|||||||||||||||||||||||||||||||||||||||
| 14. |
Write different layers of security in SAP. |
|
Answer» DIFFERENT layers of security in SAP are as follows:
|
|
| 15. |
Can you explain what a ‘user compare’ does in SAP security? |
|
Answer» In CASES where a ROLE is used to generate authorization profiles, the generated profile is not entered into the user master record until the user master record is COMPARED. It can be automated by SCHEDULING the report FCG_TIME_DEPENDENCY every DAY. |
|