Auto-Logout after 15 Minutes, but rdisp/gui_auto_logout is set to 0
Hi everyone is logged out of our Solution Manager GUI-Session after 15 Minutes. The parameter rdisp/gui_auto_logout is set to 0. We tried also to set it to 7200 (2h), but the same effect... We will be...
View Articlesap security isuee
Dear SAP, i have one doubt in sap security i need to give full FICO module tcode authrisation to one userid only fico module tcodes full authrisation remaining module tcodes will not to work is it...
View ArticleNot able to see my own log
Hi, I have controller access and accessing the system through a Firefighter id. However, when I check for Firefighter logs in NWBC, I see all other users who have logged in except my id. Can you please...
View ArticleFeatured Content in Security
Secure Digital Business Transformation: What every CIO/CSO should knowIn a recent interview at SAP TechEd Las Vegas, Gerlinde Zibulski hosted a panel of experienced security experts from SAP discussing...
View ArticleMass deletion of roles from users
I want to delete all roles from locked users. Is there a specific transaction for this instead of SU10? In SU10 one has to enter the roles to remove.
View Articlecan't run ABAP program 'RS_ABAP_SOURCE_SCAN'
Hi expert, I ran this ABAP program trying to search a string in all abap codes, but message 'string not found' showed up immediately. then I check SU53, I checked with our security, even granted...
View ArticleHow to create connection between PFCG role and position in organization model?
Hi Expert, I create one role via t-code PGCG as below and create a position such as 'sales manager' in organization model via t-code PPOMA_CRM. Could you please tell me how to build connection between...
View ArticleSecure storage remote access
Hi, I'm trying to implement a simple java standalone application that will connect to a J2EE instance, get a handle on "ts~sec~securestorage~service" and use it like described in Examples for Using...
View ArticleSecurity Audit Log - Event AUY folder-path\file-name variable too short
Hello Experts, I am trying to fulfill an auditing requirement to log all opening of attachments from GOS in the SAP ABAP system.We are using a combination of RAL and SAL to gather the data we require,...
View ArticleOne employee - two users (end user and superuser)?
Dear Friends, I have a question concerning the management of SAP users with extended permissions. Currently all our employees access the system to fill in the worksheet, manage travel and other...
View ArticleHow to replicate role in Hana from BW without using transaction - RS2HANA_CHECK
Gurus.. I need some clarification. When the DSO's are activated in BW, the role for Hana is created automatically in BW and RS2HANA_CHECK is utilized to generate HANA authorizations from BW. Is there...
View ArticleClear Understandable Documentation for Security Experts
How often have you struggled with the documentation for our security products here at SAP? You can't find what you are looking for? When you do find it, you can't make heads or tails of it? Or it is so...
View ArticleCustom object vs Role transport dependency
Hi Experts, We built a custom auth object which got transported to QA before PFCG role but still the PFCG role is not generated via transport. Role is fine in Development. Can anyone please advise if...
View ArticleHow to monitor the transactions executed by user?
Hi All, I would like to monitor the transactions executed and objects / tables that were modified for a user in a period of time. For example the following Query: All The transactions executed for...
View ArticleError while connecting via SSO using SNC parameters of SAP .NET Connector
Our SAP systems at my company are not SSO. But we have recently developed quite a few ASP.NET web applications that use the SAP .NET Connector to read and write data into and out of SAP. We would...
View ArticleNew functionalities in SU25
Hi, We are hitting SAP_BASIS 740 version as effect SU25 has been enhanced with added functionalities. Can I get details for these two options and when it is supposed to be used? Thanks,Krishna
View ArticleUsing BAdI HRBAS00_STRUAUTH to override structural authorization for specific...
Hi all, For a client I'm trying to develop an exception to structural authorizations for specific T-codes.I have figured out that using BAdI HRBAS00_STRUAUTH should be suitable for this.There are two...
View ArticleUser XYZ has no authorization for tp command IMPORT
Dear friends, We have several users who are facing the issue while importing TR in QA system from DEV system. We have checked with the users by assigning them SAP_ALL and even then they are facing same...
View ArticleHow to prevent user from accessing a a specific field in a table?
Hello, From Authorization perspective, there is possibilities to restrict access to tables and group of tables via S_TABU_NAM and S_TABU_DIS.. Is there a way to restrict access to a specific field in a...
View ArticleAuthorization object conflicts in a user profile
We have a requirement where we need to maintain different values of the same authorization object in two different roles for the same user. The requirement is for a user to have ability to display...
View Article