Quantcast
Channel: SCN : All Content - Security
Browsing all 2858 articles
Browse latest View live

Canonical Names not determined

hi,  In tcode SU01---> SNC Tab---> SNC name     I am getting Canonical name not determined error. I checked SM30--> USRACL view and I dont find names for some of the users. In Production,...

View Article


Copying Company Address from one SAP system to another

Hi All,I need to copy my entire set of company address from one SAP system to another SAP system. Both are different landscape and are not connected through CUA as well.Is there a way for this. Thanks...

View Article


Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)

This document was generated from the following discussion: Recommended Settings for the Security Audit Log (SM19 / SM20) This blog had started to give recommendations about settings for the Security...

View Article

LSMW does not record Role assignment.

Hi experts, We are using Component EHP7 for ERP6.0. I am trying to do LSMW recording for role assignment for user. I tried with SU10 but role field is not getting recorded. I need to assign multiple...

View Article

Mass Password Change in SU10

Hello Experts,   We use ECC6. In this version in TCode SU10 there is an option of mass password change.But I couldn't type the desired password. I can only press on the "generate password" button,which...

View Article


The Official SAP Global Security Space

As the leading provider in enterprise applications SAP has a long-standing responsibility to ensure security of its products. Secure software is not developed coincidentally. That's why SAP follows a...

View Article

Image may be NSFW.
Clik here to view.

Restrict MM02 views in transaction variant SHD0

Hello, is there any chance to restrict material views while creating MM02 variant in SHD0?I would like to restrict it only to the MRP1 view where only one field (MARC/EISBE) need to be edited.I was not...

View Article

Different BOM authorisations for different plants and activities

Hi, I'm struggling a bit with setting up BOM authorisations for the following: Role A needs to be able to maintain WBS & Material BOMs in plant 1 but in plant 2 needs to only display WBS BOMs and...

View Article


SAP Enterprise Threat Detection

  OverviewThe interconnected nature of modern business systems means that successful companies with critical business on SAP software must effectively manage exposure to external and internal threats....

View Article


You are not authorized to change Material description

Dear Experts, I have an issue , that I am using one user id which has  SAP_ALLSAP_NEWT_YB250030T_YB250045 profile . But when I go to MM02 and try to change the description of the selected material it...

View Article

Security advantage with reverse invoke or not?

Hi colleagues, we have an scenario with an reverse proxy in front of an sap system. The reverse proxy stands in the dmz. The sap system is in data center. The Reverse Invoke with a sap webdispatcher in...

View Article

Image may be NSFW.
Clik here to view.

Finding abnormal activities

I reported in the past of the project in which my company and SAP Deutschland SE & Co.  KG (SAP) worked together in order to attach non SAP systems of the city Wolfsburg to their ETD instance. I...

View Article

How can i activate TLS 1.1+ on SAP AS JAVA 7.31 client-side?

I only know sap note"510007 - Setting up SSL on Application Server ABAP". If i apply the informations of this note to AS JAVA,   "The built-in defaults for the client-side enables only SSLv3 + TLSv1.0...

View Article


RAL - GOS Attachments

Hello Experts, I am having an issue with RAL and the logging of actions performed in the GOS attachments list. My intention is to generate the following information using RAL. I shall use transaction...

View Article

Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)

This document was generated from the following discussion: Recommended Settings for the Security Audit Log (SM19 / SM20) This blog had started to give recommendations about settings for the Security...

View Article


how to configure SSO for BPC 10 on netweaver 7.3

Hi Guys, I'm now having an requirement about confguring sso on BPC 10 on NW7.3.The object is to access a report on enterprise Portal from BPC 10 without logon again.I've already finished sso...

View Article

Acknowledgments to Security Researchers - Previous Months (2014 on wards)

The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...

View Article


Image may be NSFW.
Clik here to view.

SAP Security Patch Day - March 2016

This post by SAP Product Security Response Team shares information on Patch Day Security Notes* that are released on second Tuesday of every month and fix vulnerabilities discovered in SAP products....

View Article

The Official SAP Product Security Response Space

As a global leader in business software, SAP takes customer security seriously and collaborates with external security researchers including research companies in ensuring that vulnerabilities...

View Article

Acknowledgments to Security Researchers

The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...

View Article
Browsing all 2858 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>