Quantcast
Channel: SCN : All Content - Security
Browsing all 2858 articles
Browse latest View live

How to secure generated files?

Our legal department wants to generate intellectual property files in our BI system for analytics and reporting, but wants us to ensure that no one will be able to access these files via SE16 table...

View Article


Image may be NSFW.
Clik here to view.

Configuring SAP SNC without Single Sign-On on UNIX/Solaris/Linux

So, you want to enable SNC (without Single Sign On -- SSO) in your environment?  You have Solaris (or other UNIX) and you don't want to pay for expensive third party libraries? SAP has a solution for...

View Article


Authorization control for profit center values in profit center reports

Hi, Can anyone let me know how to get the authorization control with that of the profit center values for the below mentioned T-codes...We tried to get the authorization control for the below mentioned...

View Article

Image may be NSFW.
Clik here to view.

IGS-Call of RFC-FM PIGFARMDATA fails due to unknown missing Authorization

Hello folks, I'm having an authorization-based problem with the ESS/MSS-Teamcalendar WDA-Application which uses the resources of the Internet Graphics Server.  CL_IGS_DATA===================CM006...

View Article

does SAP upgrade cover prievious security notes.

Hi, i am beginner in security field and have this confusion. I am using Solution Manager to find out missing security notes from my system. Should i filter the result and implement security notes that...

View Article


How Security design can effect the performance of SAP System

Dear experts , We have a landscape where we have Business one ,xrpm ,BO etc ssytem and have a role design where techincal role are separated from org roles (Enabler role concept ) which means when a...

View Article

CRM Security help needed

Hi, My PFCG Role Menu data external services are not appearing which is imported from a file created by report CRMD_UI_ROLE_PREPARE in the PFCG transaction. Bussiness role and PFCG role mapping is...

View Article

JMX security exception : checkmbeanpermission

Hello Experts, I need to know the reason for below error message and how to resolve it. com.sap.engine.services.jmx.exception.JmxSecurityException: Caller --userid-- not authorized, only role...

View Article


SAP events and audit trails to external SysLog Server

All, looking for a solution to get SAP events and audit trails to an external SysLog (not the SAP Syslog) Server.Actually I'm working on a PCI project where we would really like to have this...

View Article


Image may be NSFW.
Clik here to view.

Fire Figther jobs issues

Continuation with the blog on installing FF, I am posting some issues we might face with FF jobs. http://scn.sap.com/community/security/blog/2013/01/07/sap-firefighter-installation Fire Figther jobs...

View Article

SAP NetWeaver Identity Management Identity Center Implementation Guide -...

This document describes how to configure, implement and use self-service password reset. The password reset process consists of the following three steps: identify, authenticate and set password.View...

View Article

Mass deletion of user groups

Hi..   I wanted to delete a list of user groups in PRD system.  do we have any options to delete in mass, instead of deleting it one by one in SUGR. As we have SU10 for mass user changes.  Thanks...

View Article

SAML authentication on AS-ABAP 7.31

Hi All, I have an Abap webdynpro that I would like to secure with SAML 2 authentication.  Do I need an AS-Java system involved or can I configure SAML directly between the identity provider (Tivoli)...

View Article


EHP6 upgrade queries

We are going to upgrade to EH6 and I have few queries related to security. 1. All the documentation and forum post related to upgrade suggest, that the su25 security activities begin during the "EHP6...

View Article

Is there any harm on changing user SAPCPIC's password?

The user SAPCPIC was used in older releases (less than 4.0) for communication purposes, via RFC, between ABAP systems.  SAPCPIC was used mainly by program SAPXPG in order to return the delivery outputs...

View Article


No Authorization for Equipment Category

Hi Experts, All users are empowered with SAP_ALL authorization in our clients Development client. However when a user tried to change some equipment master data using TCode IE02 an error message...

View Article

Bobj - BO Security : how can I find the list of access that a GROUP has ?

HI all, I can't find a place where we can have a list of access that a group has, I'll try to better explain this : I have a user group, called "Webi Users" and I have assigned this user group to a new...

View Article


SCUL logs in grey and not processing in SAP CUA

Hello All, Currently we are facing some issues with our CUA system. When we try to distribute scul logs for a child system in CUA, it is not happening and the logs are for that particular system were...

View Article

how to search authorization objects by field?

A developer wrote a custom report.  It uses some fields that are sensitive.  I tell developer he must write AUTHORITY-CHECK into the code and then he asks me "ok... I will do that, but which...

View Article

Is the cert code P_ADM_SEC_70 already replaced by code C_AUDSEC_731

Hello All, I search the cert code P_ADM_SEC_70 but it is no longer found in SAP training site.Is it already replaced by C_AUDSEC_731 or is there a new version for P_ADM_SEC coming out?  Regards,Emael

View Article
Browsing all 2858 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>