Quantcast
Channel: SCN : All Content - Security
Browsing all 2858 articles
Browse latest View live

ABAP system and LDAP authentication

Hi Experts I would like to know if SAP ERP ABAP only system can be authenticated by LDAP user information(not SSO or Copy password from LDAP). LDAP server has all of authentication data and every other...

View Article


Image may be NSFW.
Clik here to view.

Account group is not getting restricted in the tcode XK01

Hi all, I am in a great dilemma. Kindly help me. Here in our production environment we got one requirement. I have to restrict the account group in XK01(Vendor creation) for some department only. I...

View Article


Changing role's long text via ECATT script

Hi, I am writing an ECATT script to change the long text of a role. When I try to add my parameter values, I don't see a field for the role's long text (description tab). We have approximately 80 roles...

View Article

SAP AS Java affected from commons-collection vulnerability?

Dear all, we are running an PI AEX (AS Netweaver Java 7.4) and I recently heard about this vulnerability: What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This...

View Article

Restrict Material type creation using MM01

Hi experts,   We want to restrict some user's usage when access MM01 with limited material type. I have done below steps:1. We hae a material type ZNBW2. Create an authorization group ZNBW in SE54.3....

View Article


Image may be NSFW.
Clik here to view.

Featured Content in Security

Risk-Based Authentication with SAP Cloud Identity ServiceDo you want to flexibly configure authentication to your applications based on your security requirements and corporate needs? Check out...

View Article

SAP Cloud Identity Service

OverviewThe SAP Cloud Identity solution is a cloud service for identity lifecycle management for SAP Cloud applications and on-premise applications. It provides services for authentication, single...

View Article

Image may be NSFW.
Clik here to view.

Is possible to use variables as auth. value?

Hi! I need to restrict access to specific data only to own user who creates that data. There is an authorization object, it checks the user: Is don't want to create a role for individual user, is...

View Article


restricting FV60 to not post affects transaction F-47

Hi we have a role that has both transactions FV60 and F-47 we tried to restrict FV60 to not post but modifying the object F_BKPF_BLA and take out value 01with doing this it took the button post out of...

View Article


How to find a list of reports in sap BW

I am new for Sap BW securitywe have few reports generated in SCM, CRM  AND HCM from Query designer. I would like to view list of all the reports and export it to excel file .Is their any specific...

View Article

Role assigned that does not exist!?

Hello, we have users in SAP System which have roles assigned, that does not exist.I get a list of this users, when i run scug in cua. But i can't find a report to verify the user for role consistency...

View Article

P_ORGINCON - Auth struct

Hi experts, I have this functional problem : A user Manager can manage some infotype of his own team but he must also be able to see infotype 1 and 2 for all employee of the company.Right now with the...

View Article

Image may be NSFW.
Clik here to view.

ETD monitors non SAP systems

Hello everybody, I like to introduce myself first. My name is Patrick and I am a security consultant at <removed by moderator>.Today, I like to talk about our first project “connecting non SAP...

View Article


Parameter LOGIN/PASSWORD_CHANGE_WAITTIME = 0

Hi Expert, We are implementing SAP Multi Channel Foundation for our client.We want to allow internet users to change their password as many times they would each day. The problem is : Security...

View Article

C4C Cloud Identity Service

Hi All, I am trying to understand the required effort to integrate C4C with SAP Cloud Identy. The SAML Configuration seems to be straighforward by exchanging the XML file. I have a question concerning...

View Article


Configuring Secure Network Communication (SNC) between SAP systems and...

getting  an error while provisioning user after configuring IT resource with SNC  SNC steps followed 1.     Creating SAP PSE            sapgenpse get_pse -p SNCPSE.pse -x Password@123...

View Article

Error in uploading file in SU22.

Hi, I have activated VIM authorization model due to which the VIM specific transactions are now going through authorization checks.For this, I want to update the USOBT_C & USOBX_C tables so that...

View Article


Composite Role

Hi Experts, I am new to composite role concept! Assume if we have role: X and Role: Y in a composite role Z. X have a list of Tcodes and some org values, Y have only org values which are different from...

View Article

Sap Logon password Length

Hi All,    In ECC6.0 when a user is setup there is a option which says password needs to be > 6. But there is no restriction on the max length . We would like to restrict the password length to 8....

View Article

Copying Company Address from one SAP system to another

Hi All,I need to copy my entire set of company address from one SAP system to another SAP system. Both are different landscape and are not connected through CUA as well.Is there a way for this. Thanks...

View Article
Browsing all 2858 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>