Quantcast
Channel: SCN : All Content - Security
Browsing all 2858 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

RFC_READ_TABLE with other user (IS this possible?)

Hi I will explain my problem I want use RFC connection with function RFC_READ_TABLE The problem IS I dont want use the user where they are in the red circle (inside sm59)  I want use USER and password...

View Article


Image may be NSFW.
Clik here to view.

Issues with Analysis Authorization checks in APO

Hi Friends, I am facing an issue with Analysis authorization checks in APO.We have setup user access based on Management Entity (Analysis authorization - AGMMGTENT and 0TCAACTVT) and core APO...

View Article


Acknowledgments to Security Researchers - Previous Months

The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...

View Article

Acknowledgments to Security Researchers

The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...

View Article

SAP Cloud Identity Service

OverviewThe SAP Cloud Identity solution is a cloud service for identity lifecycle management for SAP Cloud applications and on-premise applications. It provides services for authentication, single...

View Article


SAP SSO With out integrating with LDAP/Active Directory

Dear All, Good Day. We have following components in our landscape. SAP ECC 6.0 EHP7 (HANA DB)SAP BI 7.4 (HANA DB)SAP EP 7.4 (Syabse DB)SAP BO 4.1 (Sybase SQL anywhere)SAP Solman 7.1 (Sybase DB)SAP CRM...

View Article

Audit log of customized table.

Dear experts, I need to trace log of some tables. In spro transacction there is one customize transacction KEDE. This transacction is used to define derivation rules and generates entries with tables...

View Article

SAP Business Objects Password Expiry

Can anyone please assist with this issue: We currently have a SAP BOBJ 4.1 environment which is internet facing which authenticates via our BW 7.3 which is in the LAN. The issue arises when the...

View Article


SAP HR Security

Is there any possibility of assignment of a list of roles to a user's position ID in a single attempt rather then assigning one role at a time via maintain position T-Code PO13 ?

View Article


PFCG Current version not generated

Facing a weird issue with PFCG role generation. Not able to generate the role in PFCG, attached error screenshot too. This error is started coming up after creation of Z authorization object.Please...

View Article

remove value from f4 search based on authorization

As we have multiple company code and other configuration related to it, we want to restrict the user not to view any different company code or other values related based on role and authorization, how...

View Article

SAP WM Cycle counting

Hi, We have configured Cycle counting process for Physical Inventory in WM. That is working good.our Key users are Feeling difficulty to identify when particular material is to be Physical...

View Article

How to find out which queries are being used ?

We have a number of InfoSet Queries which the users are calling from SQ00. Some of them are very old. I would like to find out which queries are being used, so we can have the idle queries...

View Article


List of Users against their Inbox documents

Hello All, Is it possible to get list of SAP users along with their inbox count(SBWP), which means the output should display in same screen/page.So that at the end of every month we can check this...

View Article

SAP Cloud Identity Service

OverviewThe SAP Cloud Identity solution is a cloud service for identity lifecycle management for SAP Cloud applications and on-premise applications. It provides services for authentication, single...

View Article


JCo and SNC

Hi, I want to build my own JCo client and secure it using SNC. The client can connect without SNC, so the basic setup should be good. I do have first of all a basic question how it is supposed to work:...

View Article

SAP Enterprise Threat Detection

The interconnected nature of modern business systems means that successful companies with critical business on SAP software must effectively manage exposure to external and internal threats. SAP...

View Article


Influence about system performance by RAL, SAL

Hi, Experts.My team are going to use RAL(Read Access Log) and SAL(Security Audit Log)for logging users access to sensitive data.To meet the compliance, we have to log users' activity informationas...

View Article

Image may be NSFW.
Clik here to view.

User Authorization don't work in MD01.

Hi!  I created the role with  transaction MD01 only. System generated two Authorization Objects:1. S_TCODE - Transaction Code Check at Transaction Start:MD012. M_MTDI_ORG - Organizational Levels for...

View Article

SAP ABAP secure coding related training session

Hi Experts, Do you know of any training or code jams provided by SAP for organizations related to SAP ABAP secure coding?

View Article
Browsing all 2858 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>