RFC_READ_TABLE with other user (IS this possible?)
Hi I will explain my problem I want use RFC connection with function RFC_READ_TABLE The problem IS I dont want use the user where they are in the red circle (inside sm59) I want use USER and password...
View ArticleIssues with Analysis Authorization checks in APO
Hi Friends, I am facing an issue with Analysis authorization checks in APO.We have setup user access based on Management Entity (Analysis authorization - AGMMGTENT and 0TCAACTVT) and core APO...
View ArticleAcknowledgments to Security Researchers - Previous Months
The SAP Product Security Response Team thanks all researchers and security IT professionals that helped with discovering and solving security vulnerabilities. Their findings have helped SAP to maintain...
View ArticleAcknowledgments to Security Researchers
The SAP Product Security Response Team thanks all researchers and security IT professionals that help with discovering and solving security vulnerabilities. Their findings continuously help SAP...
View ArticleSAP Cloud Identity Service
OverviewThe SAP Cloud Identity solution is a cloud service for identity lifecycle management for SAP Cloud applications and on-premise applications. It provides services for authentication, single...
View ArticleSAP SSO With out integrating with LDAP/Active Directory
Dear All, Good Day. We have following components in our landscape. SAP ECC 6.0 EHP7 (HANA DB)SAP BI 7.4 (HANA DB)SAP EP 7.4 (Syabse DB)SAP BO 4.1 (Sybase SQL anywhere)SAP Solman 7.1 (Sybase DB)SAP CRM...
View ArticleAudit log of customized table.
Dear experts, I need to trace log of some tables. In spro transacction there is one customize transacction KEDE. This transacction is used to define derivation rules and generates entries with tables...
View ArticleSAP Business Objects Password Expiry
Can anyone please assist with this issue: We currently have a SAP BOBJ 4.1 environment which is internet facing which authenticates via our BW 7.3 which is in the LAN. The issue arises when the...
View ArticleSAP HR Security
Is there any possibility of assignment of a list of roles to a user's position ID in a single attempt rather then assigning one role at a time via maintain position T-Code PO13 ?
View ArticlePFCG Current version not generated
Facing a weird issue with PFCG role generation. Not able to generate the role in PFCG, attached error screenshot too. This error is started coming up after creation of Z authorization object.Please...
View Articleremove value from f4 search based on authorization
As we have multiple company code and other configuration related to it, we want to restrict the user not to view any different company code or other values related based on role and authorization, how...
View ArticleSAP WM Cycle counting
Hi, We have configured Cycle counting process for Physical Inventory in WM. That is working good.our Key users are Feeling difficulty to identify when particular material is to be Physical...
View ArticleHow to find out which queries are being used ?
We have a number of InfoSet Queries which the users are calling from SQ00. Some of them are very old. I would like to find out which queries are being used, so we can have the idle queries...
View ArticleList of Users against their Inbox documents
Hello All, Is it possible to get list of SAP users along with their inbox count(SBWP), which means the output should display in same screen/page.So that at the end of every month we can check this...
View ArticleSAP Cloud Identity Service
OverviewThe SAP Cloud Identity solution is a cloud service for identity lifecycle management for SAP Cloud applications and on-premise applications. It provides services for authentication, single...
View ArticleJCo and SNC
Hi, I want to build my own JCo client and secure it using SNC. The client can connect without SNC, so the basic setup should be good. I do have first of all a basic question how it is supposed to work:...
View ArticleSAP Enterprise Threat Detection
The interconnected nature of modern business systems means that successful companies with critical business on SAP software must effectively manage exposure to external and internal threats. SAP...
View ArticleInfluence about system performance by RAL, SAL
Hi, Experts.My team are going to use RAL(Read Access Log) and SAL(Security Audit Log)for logging users access to sensitive data.To meet the compliance, we have to log users' activity informationas...
View ArticleUser Authorization don't work in MD01.
Hi! I created the role with transaction MD01 only. System generated two Authorization Objects:1. S_TCODE - Transaction Code Check at Transaction Start:MD012. M_MTDI_ORG - Organizational Levels for...
View ArticleSAP ABAP secure coding related training session
Hi Experts, Do you know of any training or code jams provided by SAP for organizations related to SAP ABAP secure coding?
View Article