How to secure generated files?
Our legal department wants to generate intellectual property files in our BI system for analytics and reporting, but wants us to ensure that no one will be able to access these files via SE16 table...
View ArticleConfiguring SAP SNC without Single Sign-On on UNIX/Solaris/Linux
So, you want to enable SNC (without Single Sign On -- SSO) in your environment? You have Solaris (or other UNIX) and you don't want to pay for expensive third party libraries? SAP has a solution for...
View ArticleAuthorization control for profit center values in profit center reports
Hi, Can anyone let me know how to get the authorization control with that of the profit center values for the below mentioned T-codes...We tried to get the authorization control for the below mentioned...
View ArticleIGS-Call of RFC-FM PIGFARMDATA fails due to unknown missing Authorization
Hello folks, I'm having an authorization-based problem with the ESS/MSS-Teamcalendar WDA-Application which uses the resources of the Internet Graphics Server. CL_IGS_DATA===================CM006...
View Articledoes SAP upgrade cover prievious security notes.
Hi, i am beginner in security field and have this confusion. I am using Solution Manager to find out missing security notes from my system. Should i filter the result and implement security notes that...
View ArticleHow Security design can effect the performance of SAP System
Dear experts , We have a landscape where we have Business one ,xrpm ,BO etc ssytem and have a role design where techincal role are separated from org roles (Enabler role concept ) which means when a...
View ArticleCRM Security help needed
Hi, My PFCG Role Menu data external services are not appearing which is imported from a file created by report CRMD_UI_ROLE_PREPARE in the PFCG transaction. Bussiness role and PFCG role mapping is...
View ArticleJMX security exception : checkmbeanpermission
Hello Experts, I need to know the reason for below error message and how to resolve it. com.sap.engine.services.jmx.exception.JmxSecurityException: Caller --userid-- not authorized, only role...
View ArticleSAP events and audit trails to external SysLog Server
All, looking for a solution to get SAP events and audit trails to an external SysLog (not the SAP Syslog) Server.Actually I'm working on a PCI project where we would really like to have this...
View ArticleFire Figther jobs issues
Continuation with the blog on installing FF, I am posting some issues we might face with FF jobs. http://scn.sap.com/community/security/blog/2013/01/07/sap-firefighter-installation Fire Figther jobs...
View ArticleSAP NetWeaver Identity Management Identity Center Implementation Guide -...
This document describes how to configure, implement and use self-service password reset. The password reset process consists of the following three steps: identify, authenticate and set password.View...
View ArticleMass deletion of user groups
Hi.. I wanted to delete a list of user groups in PRD system. do we have any options to delete in mass, instead of deleting it one by one in SUGR. As we have SU10 for mass user changes. Thanks...
View ArticleSAML authentication on AS-ABAP 7.31
Hi All, I have an Abap webdynpro that I would like to secure with SAML 2 authentication. Do I need an AS-Java system involved or can I configure SAML directly between the identity provider (Tivoli)...
View ArticleEHP6 upgrade queries
We are going to upgrade to EH6 and I have few queries related to security. 1. All the documentation and forum post related to upgrade suggest, that the su25 security activities begin during the "EHP6...
View ArticleIs there any harm on changing user SAPCPIC's password?
The user SAPCPIC was used in older releases (less than 4.0) for communication purposes, via RFC, between ABAP systems. SAPCPIC was used mainly by program SAPXPG in order to return the delivery outputs...
View ArticleNo Authorization for Equipment Category
Hi Experts, All users are empowered with SAP_ALL authorization in our clients Development client. However when a user tried to change some equipment master data using TCode IE02 an error message...
View ArticleBobj - BO Security : how can I find the list of access that a GROUP has ?
HI all, I can't find a place where we can have a list of access that a group has, I'll try to better explain this : I have a user group, called "Webi Users" and I have assigned this user group to a new...
View ArticleSCUL logs in grey and not processing in SAP CUA
Hello All, Currently we are facing some issues with our CUA system. When we try to distribute scul logs for a child system in CUA, it is not happening and the logs are for that particular system were...
View Articlehow to search authorization objects by field?
A developer wrote a custom report. It uses some fields that are sensitive. I tell developer he must write AUTHORITY-CHECK into the code and then he asks me "ok... I will do that, but which...
View ArticleIs the cert code P_ADM_SEC_70 already replaced by code C_AUDSEC_731
Hello All, I search the cert code P_ADM_SEC_70 but it is no longer found in SAP training site.Is it already replaced by C_AUDSEC_731 or is there a new version for P_ADM_SEC coming out? Regards,Emael
View Article