Featured Content in Security
Enable Two-Factor Authentication with SAP Cloud Identity ServiceDo you have cloud applications for your employees or partners that you want to protect in a more secure and reliable way? Read Radostina...
View ArticleInternal use Cloud Identity service in PROD landscape
Dear Colleagues,Our team would like to create an SAP HANA Cloud app which allows users/customers to author their own Roadmaps, of course the data from different companies must be isolated. After...
View ArticleAuthorization field for SAP Standard Field
Hello All, I having a query on Authorization field creation. We are having a field name "Follow Up Material" or NFMAT in MM01/MM02/MM03 Transaction under MRP4 Tab. I have checked if there is some...
View ArticleHow to get details for RFC last used date
Hai Friends, we are using lot of RFC's in our Production SAP System. How to get details for RFC last used date and who are all used. I have searched in audit logs file via SM20.but i could not get....
View ArticleWhere can I find an explanation of all RSPARAM settings?
Hello Everyone, Where can I find an explanation of all RSPARAM settings and the possible options especially for user-defined? and what does a blank user-defined field mean? I am a SAP neophyte. Thank you.
View Articlelist users with multiple transactions
Hello, I try to list users that own multiple transactions. In SUIM, I can list users with multiple roles, or users with multiple profils, but I can't put several transactions at once. Did someone...
View ArticlePassword synchonisation between two ERP systems
Please assist Here is my scenario. We have two ERP systems. One for HR and Finance and one for Retail.HR includes Employee Self Service and Learner Portal Most of our users do NOT have an AD...
View ArticleSearch list- specific org.levels should be displayed
Dear All We have a below scenario, we required to hide specific organisation levels( plant, company etc.) from F4 search list. Example: We have 2 controlling area, 1000 & 2000. User A having...
View ArticleRestriction BP transaction (by BP Grouping)
*******************************************************************************************************IMPORTANT:...
View ArticleAuthorization/user role to save IDoc as XML
Dear experts, I have created a user account for a user to send Idocs. I have assigned the following user roles:SAP_BC_MID_ALE_MD_LOfor allowing to send IDocs, SAP_IDOC_EVERYONEfor displaying the IDocs...
View ArticleCreate technical user in HANA
Hi Team, I need to know how to create a technical user (password does not expire) in HANA using HANA studio.Also for an existing user how can i make sure that the password does not expire. Regards,Yasmin
View ArticleProfile not generated after transport.
Hi All, We are facing an issue in which I transported a role from DEV to PRODUCTION through Q. Our role is generated in DEV......but not in Q and Production. As per earlier posts in the forum,I checked...
View ArticleSPRO Restriction based on userid
Hi Experts, i am new to the security, kindly help me in below issue. i need to restrict the SPRO based on the module wise. i have create the new project under SPRO_ADMIN and assign user and user can...
View ArticleTcode Authorization Requirement - F_FAGL_LDR
Hello, Years ago before I was the SAP Security Admin for my org, an additional authorization requirement was implemented for tcodes - Ledger auth F_FAGL_LDR and F_FAGL_SEG. However, SU24 was never...
View ArticleA user locking related SSO issue
Sometime, in a special scenario, you might get some SSO issue, and find it is related to the user locking. That is when the user is locked, the SSO could not work as usual, user get a logon page. The...
View ArticleSAP ECC - Authorizations tcode PA20/PA30
Hi all, I have a doubt about how the system identifies the values associate to PA20 and PA30 transactions in a role with this two transactions. Both transaction have the object P_ORGIN but when keep...
View ArticleSystem asking to change password everytime a user is trying to Login.
Hello, SAP is asking to change password every time the user is trying to login. Checking profile parameter will not make sense as this is happening only to one user. I think the answer lies in USR02...
View ArticleSecuring SAP Systems from XSS vulnerabilities Part 4: Defense for SAP HANA XS
Today’s post is the last in the series of articles about XSS vulnerabilities in SAP systems. The previous parts describe how to prevent XSS in SAP NetWeaver ABAP and SAP NetWeaver J2EE. XSS is one of...
View ArticleBest way to control display authorizations to GOS (attachment list) in XK03
Hello All Purpose: Prevent users to access confidential attachments in XK03 which contains bank account details - SSN etc., I tried to check through all existing forums, solutions etc. but please...
View ArticleProgram RSUSR003 Reports "Security violation" in SM21 system log
When you see the error in system log, it means report RSUSR003 ran at that time and security violation was detected. First step is to ensure note 1451760 is applied in the system. If the error persists...
View Article