How does SAP evaluate (PFCG) Authorizations when used in conjunction with...
I have created a new SAP Authorization role (Role-1) via PFCG, which allows the user only to View/ Display all countries’ data of 3 InfoTypes only (Actions (0000), Org Assignment (0001), Pers....
View ArticleAbap/Security: Mass update via pfcg or function call, delimit role assignment
Hi out there,i recorded transaction pfcg to delete user assignment of a role.It works perfect, but now i need to know how to delimit the role assignment. -> How to change the end date of assignment...
View ArticleTransaction MCG3 showing more than allowed Company Codes
Hi Experts,In my company we have a financial role that has been created sometime ago and recently we notice that it allows user to input any Company Codes that is not in the Organizational Level of the...
View ArticleSAP NetWeaver ABAP Security Configuration Part 9: Security Events Logging
ERPScan's team core purpose is to take the definition of the SAP security one step further by providing its own guidelines to help SAP users carry out various security checks. We have covered :9 the...
View ArticleComposite role menu does not sync with menu of single roles
Hello, We have added a single role to a composite role. We need to update the menu of composite role also. We have tried doing it with "Import Menu --> Reimport", this resulted updating the menu to...
View ArticleEndTransaction() not working proper?
Hi all,When I call to objCompany.EndTransaction(SAPbobsCOM.BoWfTransOpt.wf_Commit) its not working properly..Please help me.....
View ArticleSm36 - restrict user to only delete theirs own jobs
Hi, Anyone know if there’s a way to restrict user to not delete jobs? in test role, DELE is not used in S_BTCH_JOB / JOBACTION , but user can still delete jobs. The purpose with role is allow user...
View ArticleGetting the Error in FPM GAF
Hi all, We have an application using date navigator when we move from step2 to step3 in FPM GAF with user1 it is working fine but when we move from step2 to step3 with user2 then we are getting...
View ArticleRestricting access to variants
Hi, We have a requirement to have variants for reports, but only certain users should have access to certain variants. Without creating a seperate report / transaction for each variant type, is there...
View ArticleADR6 TABLE_Internal Error
Dear experts,I deleted email id on some of the address ids in ADR6 table as I have multiple address number for the same person number that is linked to my BP profile. Unfortunately I lock my user id...
View ArticleRestrict controlling area on OKP1
Dear gurus, I'd like to restrict controlling area on OKP1 (Period lock of controlling area).But, I couldn't find authorization object for controlling area.Pls let me know, if you know. BR Yoshi
View ArticleSAP Workbooks are not appearing in user menu
Hi, We have added workbooks in role from PFCG.When user logged into portal,we are not able to see workbooks which we have added in role menu but it is showing reports which were added but not the...
View ArticleConfiguring SAP Enterprise Threat Detection
SAP enterprise threat detection is a HANA based SAP Solution that can monitor and correlate data from disparate SAP and non-SAP systems in the IT landscape and hence can help manage exposure to...
View ArticleTransaction MCG3 showing more than allowed Company Codes
Hi Experts,In my company we have a financial role that has been created sometime ago and recently we notice that it allows user to input any Company Codes that is not in the Organizational Level of the...
View ArticleAfter System refresh in "Q" getting 123 Duplicate USERS
Hi Experts, We have done system Refresh in Q with P backup.After restorewe have re-imported the USER MASTER DATA in Q.After this User master data reimport 123 duplicate user entries created. In SUIM...
View ArticleAdd multiple authorization objects to a transaction in SU24
Hi experts, Is it possible to add at same time multiple authorization objects to a transaction and not object by object to a transaction in SU24? Thanks.
View ArticleSecuring SAP Systems from XSS vulnerabilities Part 2: Defense for SAP...
We continue our series of posts giving a review of one of the most frequent vulnerability which affects a lot of SAP modules: cross-site scripting, or XSS. Today's post describes how to protect SAP...
View ArticleImportant Information about changing Default Keys in SAP HANA
Last week we saw a conference talk and a few press articles related to an alleged default security configuration in SAP HANA installations. We have thoroughly investigated these reports. Our...
View Articleauthorization object for print preview
Hi I am looking for the authorization object to restrict print of the document. Please help me. RegardsRaju
View ArticlePRD Production cell tracking
I am new to the forum and require some assistance. During a recent review of records within ZSEM2 for Work Package progress, we have noticed more than seven hundred records have been modified removing...
View Article