SAP ID Identity Provider API ?
I am using SAP ID identity provider for my Java/HANA application. I would like to programatically add users to the Identity Provider from my Java app. Is there an API available that would allow me to...
View ArticleHow to provide controled sm30 access to a field in a customised table??
Hi, I recieved a request from our users to create a role which will give sm30 access to a particular field in a customised table. I know we can restrict access to atable by using S_TABU_NAM...
View ArticleCUA during Upgrade
HI We have CUA configured in Solution Manager .We are planning to upgrade solution manager to the latest patch available . During downtime of solution manager How do we manage the CUA and user...
View ArticlePossibility to allow only digit based passwords in NetWeaver ABAP
Hi, Is it possible to setup up the password rules for NetWeaver ABAP, so that it's only possible to have password with digits? Based on the password rules here...
View ArticleSSF signature using SHA1 and digtal certificate
Hello I have a requirement that I sign data in an internal table using a certificate and then append the detached signature to a file which is to be sent to the bank. I have managed to import the...
View ArticleAll objects are inactive in derived roles (copied from existing derived role)
I need to create more than 1000 derived roles, from existing reference roles.Reference roles are also derived roles. So I executed LSMW for mass copy.Eg: Reference role XYZ with parent role XXXNew...
View ArticleProtect Your Connected Business Systems by Identifying and Analyzing Threats
The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP...
View ArticleSAP Enterprise Threat Detection Overview Presentation
The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP...
View ArticleSAP Insider: Safeguard Your Business-Critical Data with Real-Time Detection...
The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP...
View ArticleAcknowledgments to Security Researchers - Previous Months
The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...
View ArticleDisclosure Guidelines for SAP Security Advisories
Disclosure Guidelines for SAP Security AdvisoriesSAP takes the security of its products very seriously, with a comprehensive secure software development lifecycle process, clear quality and security...
View ArticleKE97 authority-check
Hi,In our company many users use transaction KE24 but they should be able to display only records of specific company and profit center. We are trying to use the KE97 transaction code in order to add...
View ArticleS_RFC Additional Authority Check RFC_TYPE:FUGR & RFC_NAME:SHI5 while running...
Dear All, From today itself we are facing the issue, as there is an additional check happening while running the t-code SUIM in SAP System. I can't understand why this happening, I have checked If...
View ArticleRe-generating derived roles shows changes
Hello, I respectfully ask for your guidance as I am unable to find the necessary documentation needed to support a request for our auditors. Currently, we utilize a derived role methodology with...
View ArticleAcknowledgments to Security Researchers
The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...
View ArticleCUA during Upgrade
HI We have CUA configured in Solution Manager .We are planning to upgrade solution manager to the latest patch available . During downtime of solution manager How do we manage the CUA and user...
View ArticleCUA Upgrade to higher version needed?
Hello,SAP recommends having the most current / highest version for the CUA in the landscape. In a scenario where the child systems are being upgraded to NW component 7.4 and retaining NW 7.31 for the...
View ArticleRename option want to enable in SU01 txn code
After Upgrade ERP to EHP7. we are facing issue in SU01 transaction where Rename option is disable. Please let us know what are the area we need to check for enable it.
View ArticleRole description change
Hey all, I have a question for all of you here: I want to make changes in the description of a master role and further to the derived roles. Is there a shortcut where i can update the description in...
View ArticleLogin from GUI and Portal - Backend Logged Information
Hi All, We have a scenario below and required suggestion on this...Pls help We have created 2 Employee Ids and One logged in to GUI and other Logged into Portal...We have checked logged on information...
View Article