SM19 Security Audit: Display Kernel Parameters without modified authority
Hello Experts, is there a Chance to protect the Kernel Parameters in SM19 Security Audit against unauthorized users who wants to Change/modify the setting.Exist there a user role or Profile which allow...
View ArticleAcknowledgments to Security Researchers
The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...
View ArticleIs there any object to restrict CK11N- Create Material Cost Estimate by...
Hello Experts, Is there any object to restrict transaction CK11N- Create Material Cost Estimate by material type field- MARA-MTART? Users need access to this transaction only for specific material...
View Articlestrustsso2 - cannot analyze certificate
Hello Team, Please help me to fix the issue with 'import of certificate' When we tried to import certificate we are getting 'cannot analyze certificate' error in strustsso2 When we tried to import...
View ArticleNeed sample code for using SAP Secure Storage API
Hello, I am looking for a sample code of how to use the portal's secure storage, i.e.: how to access it, generate a signature from a key pair or to get a public key I have uploaded there.I believe the...
View Articlehow to list concurrent users
Hello All, I am running a report CCUINIT to check for concurrent users on a day basis. when i look for results using CCUEVAL report it show only 15 users. Where in total number users logged on are...
View ArticleSAP user type Communication versus System and impacts
Dear all, I know that user type communication (C) are no more used in SAP systems. Now we have to use System user type. (B)...
View ArticleAnalysis and Recommended Settings of the Security Audit Log (SM19 / SM20)
This document was generated from the following discussion: Recommended Settings for the Security Audit Log (SM19 / SM20) ContentsRecommended Settings for the Security Audit Log (SM19 / SM20)Profile...
View ArticleRecommended Settings for the Security Audit Log (SM19 / SM20)
Hi Security-Folks, I like to discuss with you the recommended settings for the Security Audit Log (SM19 / SM20). Here's my proposal: Profile Parameters: rsau/enable = 1rsau/selection_slots =...
View ArticleAuthorization group changes for Security reason
In Production sometimes I have to give access to "table" transaction like SM30 in modification.When the authorization group is restricted to few tables, I can give access.But some transactions are...
View ArticleHow to check user history of logon.
Hi experts, I need to check logon details for a particular user, like last 1 week, which date he logged in and what are all the Tcodes he used. Tell me the detailed steps RegardsManjappa
View ArticleCan we find the auth method used after a user has authenticated ?
When a user is authenticated to an SAP ABAP system, they can use a userid and password, SNC or an SSO2 ticket. Is there a report, or some other way to get a list of user authentications over a period...
View ArticleUSMM System Measurement number
Hi Gurus, I read lot of posts on USMM but have few doubts. Can anyone please advise 1. When I run system measurement USMM will note the number of times system measurement is done. That means we need to...
View ArticleIssue with SAP_ALL authorization for MM_EKKO and MM_MATBEL
Hi expert, We have upgraded our SAP from ECC 6 EHP0 to ECC6 EHP7.On EHP0 i was able to archive purchasing document using MM_EKKO object.But after upgradation i am not able to archive same documents in...
View ArticleDifference between SU24, USOBT_C and USOBX_C. Plz Honestly reply.
Please do not lock or delete without providing valid answer.I have searched through this forum , but could not find. So, i have posted this. Please do not give vague excuses.
View ArticleWeb services through sharepoint stopped working after QA system refresh
Hi, We are facing an issue regarding web services in our ECC 6.0 EhP 4 QA system. We recently performed a refresh of QA from Production system using split-mirror method. Sharepoint was connected...
View ArticleUser's from different company codes are able to post hours for other company...
Hi, We found that at our customer location user's from different company codes are able to transfers hours to controlling for other company codes user's. In the transaction CAT7 with almost no initial...
View ArticleIs there any object to restrict CK11N- Create Material Cost Estimate by...
Hello Experts, Is there any object to restrict transaction CK11N- Create Material Cost Estimate by material type field- MARA-MTART? Users need access to this transaction only for specific material...
View ArticlePFCG_TIME_DEPENDENCY does not compare all roles
Hi all,we have this job running every night and performing what could be manually done by the transaction PFUD.However there is a set of single roles containing mostly PO related...
View ArticleSAP Cloud Identity Service
OverviewThe SAP Cloud Identity solution is a cloud service for identity lifecycle management for SAP Cloud applications and on-premise applications. It provides services for authentication, single...
View Article