Access to ABAPER On Production
Dear All Experts,Here, ABAPERs want to access of Debugger, SE16, SE37, SE38, SE80 on Production Server while due to security reasons I have denied number of time but every time when they went in...
View ArticleAUthorizations needed to change parameters in SU3
Gurus, What is the authorization needed to change parameters in SU3 ? I have them in change mode in one environment and only in display mode in another one. Thanks for your help, Olivier
View ArticlePayment Tolerance Groups
Hello I originally posted this in the incorrect forum. I wanted to see how the structure from a security perspective works for restricting users by tolerance groups for payments. I know where and how...
View ArticleLDAP Connection problem
Hi everyone, I am trying to setup a LDAP connection from ABAP WEB AS ECC6.0 to Win Server 2003 Active Directory.The AS is running on HP-UX v11.23. In setting up I used the steps mentioned in the ECC6.0...
View ArticleImpact of SAP ECC6.0 upgrade from EHP4 to EHP6, Security perspective.
Hello, Our client is planning to upgrade SAP ECC6.0 system from EHP 4 SP6 to EHP6 SP5.I am unable to find appropriate documents/discussions that will tell me if it has any impact on SAP Security...
View ArticleUser Profile Parameters
Benefits:This function enables you to make specific system settings for specific users.Users need not type some of the key inputs each and every time while performing the transactions, it gets...
View ArticleBI Authorization - exclude query views from search result in Analyzer
Hi Experts, I have an issue. The problem is that users can see query views in the search result when they are using Find option in Bex Analyzer.I have the menu roles where the S_RS_COMP is included,...
View ArticleSM59 and a HTTP Client Connection Using SSL
All, I'm running an ECC 6.0 (EHP 5) system. Our ECC System is a dual stack system. We've recently enabled SSL on the ECC's java stack. The SSL Server Certificate has been signed by my organization's...
View ArticleMaking Key figure Authorization relevant in Analysis Authorization
Hello, I want to make restriction on Key figure in analysis authorization. Please suggest how I can do that. I have made 0TCAKYFNM as auth. When I add 0TCAKYFNM this to analysis authorization it gives...
View ArticleDeleting position to role assignment logs??
Hi Gurus,Recently somehow for some users, their relationship with the position was deleted. (Via PPOMA I think) Is there a way to see who and when it was deleted?Background of issue.Users mentioned...
View ArticleAuthorization Trace in BI
Hello, Is there any way in BI where I can run a authorization trace in BI, similar to ST01 in R/3. For example there is a user 'A' who is able to execute a query correctly. When I go in RSECADMIN...
View ArticleHow to make SAPPORTALSDB0 cookie in Portal secure?
Portal 7.01 SP11generates multiple cookies namely JSESSIONID, SAPPORTALSDB0, MYSAPSSO2, PortalAlias, saplb_*, SAPWP_active. We found ways to make almost all of them to be sent through secure channels...
View ArticleAcknowledgments to Security Researchers
The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...
View ArticleSend notifications received in the inbox for external mail automatically
hello experts,I have a workflow that sends notifications to the user's SAP inbox. I need to send the notifications received in the inbox of each user of SAP for their e-mail externally. I've checked...
View ArticleHow to secure generated files?
Our legal department wants to generate intellectual property files in our BI system for analytics and reporting, but wants us to ensure that no one will be able to access these files via SE16 table...
View ArticleUser is still locked
Hello Experts,We are facing a problem with our systems. I have observed some of the users got locked due to multiple login with incorrect password. Exact message in SU01-Password logon not allowed (too...
View ArticleUser passwords at CUA setup time
Hello, I'm looking forward to setuping CUA. Lets say CUA is system ABC, child systems are XYZ1 and XYZ2.User John exists in both XYZ1 and XYZ2 with same username, but with different passwords.Now the...
View ArticleAudit Logs In SAP MM
Hi SAP Experts, Can anyone please explain about Audit logs and what for SM19 T Code is used in SAP MM. ThanksRouthu
View ArticleIs there a way in SAP to check what all Authorization Groups are used by...
Dear All, I have close to 100 roles, where in the Authorization Object S_TABU_DIS is configured as below Actvt 03Authorization Group * Actvt 02, 03Authorization Group * Few Display roles are...
View ArticleBobj - BO Security : how can I find the list of access that a GROUP has ?
HI all, I can't find a place where we can have a list of access that a group has, I'll try to better explain this : I have a user group, called "Webi Users" and I have assigned this user group to a new...
View Article