Quantcast
Channel: SCN : All Content - Security
Browsing all 2858 articles
Browse latest View live

SAP ID Identity Provider API ?

I am using SAP ID identity provider for my Java/HANA application. I would like to programatically add users to the Identity Provider from my Java app. Is there an API available that would allow me to...

View Article


How to provide controled sm30 access to a field in a customised table??

Hi, I recieved a request from our users to create a role which will give sm30 access to a particular field in a customised table. I know we can restrict access to atable by using S_TABU_NAM...

View Article


CUA during Upgrade

HI  We have CUA configured in Solution Manager .We are planning to upgrade solution manager to the latest patch available . During downtime of solution manager How do we manage the CUA and user...

View Article

Possibility to allow only digit based passwords in NetWeaver ABAP

Hi,  Is it possible to setup up the password rules for NetWeaver ABAP, so that it's only possible to have password with digits? Based on the password rules here...

View Article

SSF signature using SHA1 and digtal certificate

Hello I have a requirement that I sign data in an internal table using a certificate  and then append the detached signature to a file which is to be sent to the bank. I have managed to import the...

View Article


Image may be NSFW.
Clik here to view.

All objects are inactive in derived roles (copied from existing derived role)

 I need to create more than 1000 derived roles, from existing reference roles.Reference roles are also derived roles. So I executed LSMW for mass copy.Eg: Reference role XYZ with parent role XXXNew...

View Article

Protect Your Connected Business Systems by Identifying and Analyzing Threats

The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP...

View Article

SAP Enterprise Threat Detection Overview Presentation

The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP...

View Article


SAP Insider: Safeguard Your Business-Critical Data with Real-Time Detection...

The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP...

View Article


Acknowledgments to Security Researchers - Previous Months

The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...

View Article

Disclosure Guidelines for SAP Security Advisories

Disclosure Guidelines for SAP Security AdvisoriesSAP takes the security of its products very seriously, with a comprehensive secure software development lifecycle process, clear quality and security...

View Article

KE97 authority-check

Hi,In our company many users use transaction KE24 but they should be able to display only records of specific company and profit center. We are trying to use the KE97 transaction code in order to add...

View Article

S_RFC Additional Authority Check RFC_TYPE:FUGR & RFC_NAME:SHI5 while running...

Dear All, From today itself we are facing the issue, as there is an additional check happening while running the t-code SUIM in SAP System. I can't understand why this happening, I have checked If...

View Article


Re-generating derived roles shows changes

Hello, I respectfully ask for your guidance as I am unable to find the necessary documentation needed to support a request for our auditors. Currently, we utilize a derived role methodology with...

View Article

Acknowledgments to Security Researchers

The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...

View Article


CUA during Upgrade

HI  We have CUA configured in Solution Manager .We are planning to upgrade solution manager to the latest patch available . During downtime of solution manager How do we manage the CUA and user...

View Article

CUA Upgrade to higher version needed?

Hello,SAP recommends having the most current / highest version for the CUA in the landscape. In a scenario where the child systems are being upgraded to NW component 7.4 and retaining NW 7.31 for the...

View Article


Rename option want to enable in SU01 txn code

After Upgrade ERP to EHP7. we are facing issue in SU01 transaction where Rename option is disable. Please let us know what are the area we need to check for enable it.

View Article

Role description change

Hey all,  I have a question for all of you here: I want to make changes in the description of a master role and further to the derived roles. Is there a shortcut where i can update the description in...

View Article

Login from GUI and Portal - Backend Logged Information

Hi All, We have a scenario below and required suggestion on this...Pls help We have created 2 Employee Ids and One logged in to GUI and other Logged into Portal...We have checked logged on information...

View Article
Browsing all 2858 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>