Quantcast
Channel: SCN : All Content - Security
Browsing all 2858 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Access to ABAPER On Production

Dear All Experts,Here, ABAPERs want to access of Debugger, SE16, SE37, SE38, SE80 on Production Server while due to security reasons I have denied number of time but every time when they went in...

View Article


AUthorizations needed to change parameters in SU3

Gurus, What is the authorization needed to change parameters in SU3 ? I have them in change mode in one environment and only in display mode in another one. Thanks for your help, Olivier

View Article


Payment Tolerance Groups

Hello I originally posted this in the incorrect forum.  I wanted to see how the structure from a security perspective works for restricting users by tolerance groups for payments. I know where and how...

View Article

LDAP Connection problem

Hi everyone, I am trying to setup a LDAP connection from ABAP WEB AS ECC6.0 to Win Server 2003 Active Directory.The AS is running on HP-UX v11.23. In setting up I used the steps mentioned in the ECC6.0...

View Article

Impact of SAP ECC6.0 upgrade from EHP4 to EHP6, Security perspective.

Hello, Our client is planning to upgrade SAP ECC6.0 system from EHP 4 SP6 to EHP6 SP5.I am unable to find appropriate documents/discussions that will tell me if it has any impact on SAP Security...

View Article


User Profile Parameters

Benefits:This function enables you to make specific system settings for specific users.Users need not type some of the key inputs each and every time while performing the transactions, it gets...

View Article

BI Authorization - exclude query views from search result in Analyzer

Hi Experts, I have an issue. The problem is that users can see query views in the search result when they are using Find option in Bex Analyzer.I have the menu roles where the S_RS_COMP is included,...

View Article

SM59 and a HTTP Client Connection Using SSL

All, I'm running an ECC 6.0 (EHP 5) system.  Our ECC System is a dual stack system.  We've recently enabled SSL on the ECC's java stack.  The SSL Server Certificate has been signed by my organization's...

View Article


Making Key figure Authorization relevant in Analysis Authorization

Hello, I want to make restriction on Key figure in analysis authorization. Please suggest how I can do that. I have made 0TCAKYFNM as auth. When I add 0TCAKYFNM this to analysis authorization it gives...

View Article


Deleting position to role assignment logs??

Hi Gurus,Recently somehow for some users, their relationship with the position was deleted. (Via PPOMA I think) Is there a way to see who and when it was deleted?Background of issue.Users mentioned...

View Article

Authorization Trace in BI

Hello, Is there any way in BI where I can run a authorization trace in BI, similar to ST01 in R/3. For example there is a user 'A' who is able to execute a query correctly. When I go in RSECADMIN...

View Article

How to make SAPPORTALSDB0 cookie in Portal secure?

Portal 7.01 SP11generates multiple cookies namely JSESSIONID, SAPPORTALSDB0, MYSAPSSO2, PortalAlias, saplb_*, SAPWP_active. We found ways to make almost all of them to be sent through secure channels...

View Article

Acknowledgments to Security Researchers

The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...

View Article


Send notifications received in the inbox for external mail automatically

hello experts,I have a workflow that sends notifications to the user's SAP inbox. I need to send the notifications received in the inbox of each user of SAP for their e-mail externally. I've checked...

View Article

How to secure generated files?

Our legal department wants to generate intellectual property files in our BI system for analytics and reporting, but wants us to ensure that no one will be able to access these files via SE16 table...

View Article


User is still locked

Hello Experts,We are facing a problem with our systems. I have observed some of the users got locked due to multiple login with incorrect password. Exact message in SU01-Password logon not allowed (too...

View Article

User passwords at CUA setup time

Hello, I'm looking forward to setuping CUA. Lets say CUA is system ABC, child systems are XYZ1 and XYZ2.User John exists in both XYZ1 and XYZ2 with same username, but with different passwords.Now the...

View Article


Audit Logs In SAP MM

Hi SAP Experts, Can anyone please explain about Audit logs and what for SM19 T Code is used in SAP MM.  ThanksRouthu

View Article

Is there a way in SAP to check what all Authorization Groups are used by...

Dear All, I have close to 100 roles, where in the Authorization Object S_TABU_DIS is configured as below Actvt 03Authorization Group * Actvt 02, 03Authorization Group *  Few Display roles are...

View Article

Bobj - BO Security : how can I find the list of access that a GROUP has ?

HI all, I can't find a place where we can have a list of access that a group has, I'll try to better explain this : I have a user group, called "Webi Users" and I have assigned this user group to a new...

View Article
Browsing all 2858 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>