TLS v1.2 with APR Tomcat connector
Hello, I hope it's the best place to post... I meet a problem with "BO Live Office" 4.1 SP7: I can't connect in HTTPS with TLS v1.2 to the "Tomcat 7.0.59" + "Java 8" server. The /!\ bubble says...
View ArticleDocumneting Newly created authorization object details
Hi All, We have created a new authorization object based on the requirement .Our Client suggested to document the new object details so it is clear what this does and when to use it.How and where to...
View ArticlePPOME - taking away transport request
Hello, I was hoping someone with PPOME / workflow knowledge could help me here... Currently, are company locks down the transaction code PPOME, meaning you have to submit a transport request any time...
View ArticleWork Center "Test" underneath implementation / Upgrade
Hi I’m not able to find any standard-role or object that enable user to see button "Test” underneath implementation / Upgrade. Can anyone advise which role to be assigned to user?Thanks and best...
View ArticleAccess to Auth Object S_DB2_COMM in production
Hi all,I have received a request from one of my DBA's to assign access to auth object S_DB2_COMM in production with activities 01 and 02. The online help for this object is very limited, however, at a...
View ArticleThe Official SAP Global Security Space
As the leading provider in enterprise applications SAP has a long-standing responsibility to ensure security of its products. Secure software is not developed coincidentally. That's why SAP follows a...
View ArticleHana Cloud Identity APIs with a HCP App
Hi guys, I have been using the SCIM API to query for users in HCI. I can call the service directly in the browser and it returns the expected results. In the application setup page of Hana Cloud...
View ArticleMass Role Download in to SAP GUI Shortcut form
Hi, Is there any possibility to download 10 roles at a time in SAP GUI Shortcut form instead of downloading in to excel or other formats. This we require when we want to upload only specific roles in...
View ArticlePO printout to a single printer
Hi All, I have a question related to printer configuration. Issue:A buyer creates a order for $60,000.It goes 2 level of approvers(Manager1 and Manager2). When the Last Manager approves the Purchase...
View ArticleAuthorization object for Movement type material typewise
Dear Experts, We are facing one issue here. We want to a SAP user for doing Material Movement(261) for special material type. Other material he can do this goods movement. But I cannot found an...
View ArticleIncorrect authorisation field in SU53 for C_STUE_WRK
Hello Team, We have received below SU53 from an end user for missing authorisation. While checking for missing for missing authorisation, we found that object C_STUE_WRK does not have field SWERKS....
View ArticlePossible values for auth objects S_PTCH_ADM and S_TOOLS_EX
Hi All, badly need your help. I am new in roie designing. My project now is for systems users to be used for DVM implementation. Can you help me what are the possible values for auth objects below in...
View ArticleAuthorize users to access data of a specific range of dates only
Hello Gurus,I got the request to set up some kind of authorization check for a group of users that will segregate the data they can read not only by organizational parameters (i.e. VKORG, which is...
View ArticleSynchronize inactive users from MSAD to ABAP
I have integrated MSAD and ABAP system successfully. From ABAP i can login to MSAD server. Also i can execute the job "RSLDAPSYNC_USER" to copy the users from MSAD to ABAP database.Now once the user...
View ArticleSAP Security Patch Day - February 2016
This post by SAP Product Security Response Team shares information on Patch Day Security Notes* that are released on second Tuesday of every month and fix vulnerabilities discovered in SAP products....
View ArticleThe Official SAP Product Security Response Space
As a global leader in business software, SAP takes customer security seriously and collaborates with external security researchers including research companies in ensuring that vulnerabilities...
View ArticleAcknowledgments to Security Researchers - Previous Months (2014 on wards)
The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...
View ArticleAcknowledgments to Security Researchers
The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...
View ArticleHow to restrict user selecting all plant values in MB26 Transcation?
Hi Guys, User is able to see all the values after executing MB26 and keeping blank in Plant . Is their anyway that it can be restrict and will only be visible to the user of which user is having access...
View ArticleBruce Schneier is currently not available!
Do you think you need a well renowned security expert to do threat modeling? I don’t think so. Sure it would be fun to do a Threat Modeling workshop with a guy like Bruce Schneier, but the sad truth is...
View Article