GRC - AC Learnings
GRC - AC Learnings
Table: 1) GRACFUNCPRM
2) GRACACTRULE
3) GRACSODRISK
4) GRACSODRISKRS
5) GRACFUNCACT
6) SCPRACTP
7) GRACFUNC
8) GRACFUNCPRMEXT
STRFCTRACE
STUSOBTRACE
3) How to check who has deleted the user and roles? Is there any table to check
this?
Ans:SUIM --> Change document for users.
7) why is there no authorization displayed even if the users have all the required
authorization available in thier profile?
Ans: check for user buffer in SU56 and referesh.
12) Highest permissible no. of profiles, auth objects and T-code in a single role?
Ans: 312 but now due to updation it has increased and no limit, 170, 14000.
14) Based on SOD what are their common roles and their Key duties?
Ans:
17) what are the pre-requisites that should be taken before assigning SAP_ALL to a
user even there is an approval from authorization controllers?
Ans: 1) Enabling the audit log using SM19
2) Retriving the audit log using SM20
25) How to find out who has deleted users in the system?
Ans: To find out who has deleted users in the system, first debug or use RSUSR100
to find the info.
Then run transaction SUIM and download the Change documents.
26) Can you change a role template? What are the three ways to work with a role
template?
Ans: Yes. There are three ways to change a role template:
27) What are the authorization objects required to create and maintain user
records?
Ans: S_USER_GRP: to assign user groups.
S_USER_PRO: to assign authorization.
S_USER_AUT: create and maintain authorizations.
31) Which t-code can be used to delete old security audit logs?
Ans: The t-code SM-18 can be used to delete old security and audit logs.
39) Which parameter is used to control the number of entries in the user buffer?
Ans: Auth/auth_number_in_userbuffer
40) Explain what things you have to take care before executing Run System Trace?
Ans: If you are tracing batch user ID or CPIC, then before executing the Run System
Trace,
you have to ensure that the id should have been assigned to SAP_ALL and SAP_NEW.
It enables the user to execute the job without any authorization check failure.
41) What is the t-code used for locking the transaction from execution?
Ans: For locking the transaction from execution t-code SM01, is used.
43) Mention which t-codes are used to see the summary of the Authorization Object
and Profile details?
Ans: SU03: It gives an overview of an authorization object
47) Explain what reports or programs can be used to regenerate SAP_ALL profile?
Ans: To regenerate SAP_ALL profile, report AGR_REGENERATE_SAP_ALL can be used.
49) Mention what SAP table can be helpful in determining the single role that is
assigned to a given composite role?
Ans: Table AGR_AGRS will be helpful in determining the single role that is assigned
to a given composite role.
50) What is the parameter in Security Audit Log (SM19) that decides the number of
filters?
Ans: Parameter rsau/no_of_filters are used to decide the number of filters.
(I supposed that it is a way for SAP to address his ambiguity of its concept of
user group and roles: is “usergroup” a grouping of people sharing the same access
or is it the role who is the grouping of people sharing the same access).
1) Organizational level fields should only be created before you start setting up
your system.
If you create organizational level fields later, you might have to do an impact
analysis.
The authentication data may have to be postprocessed in roles.
2) The fields “Activity”, “ACTVT” and “Transaction code”, “TCD” cannot be converted
into an organizational level field.
54) How many profiles can be assigned to any user master record.
Ans: Maximum Profiles that can be assigned to any user is ~ 312. Table USR04
(Profile assignments for users).
The field is defined with a length of 3750 characters.
Since the first two characters are intended for the change flag,
3748 characters remain for the list of the profile names per user. Because of the
maximum length of 12 characters per profile name,
this results in a maximum number of 312 profiles per user.
56) The authorization object does not exist in the user buffer.
Ans: The values checked by the application are not assigned to the authorization
object in the user buffer.
57) How can I do a mass delete of the roles without deleting the new roles?
Ans: There is an SAP delivered a report that you can copy, remove the system type
check and run.
It is called: AGR_DELETE_ALL_ACTIVITY_GROUPS. To use it,
you need to tweak/debug & replace the code as it has a check that ensures it is
deleting SAP delivered roles only.
58) How to find out all roles with T-code SU01?
Ans: SE16N. Execute SE16N
Table AGR_1251
Object S_TCODE
VALUE (low) SU01
59) How to find out all the derived roles for one or more Master (Parent) roles?
Ans: Execute SE16N
Table AGR_DEFINE
Use either agr_name field or Parent_agr field.
60) How can I check all the Organization value for any role?
Ans: Execute SE16N
Table AGR_1252
Role Type in the role here and hit execute.
You can always download all the information to spreadsheet also using .
62) What are the Best practices for locking expired users?
Ans: Lock the user. Remove all the roles and profiles assigned to the user. Move
them to TERM User group.
64) How to remove duplicate roles with different start and end date from user
master?
Ans: You can use PRGN_COMPRESS_TIMES to do this. Please refer to note 365841 for
more info.
65) How come the users have authorization in PFCG, but user still complains with no
authorization?
Ans: Make sure the user master is compared. May be the there is a user buffer
overflow
Also check the profile- Follow the instruction below.
SUIM > User by complex criteria.
Put the userid of user who is having issue.
Execute
70) How to restrict the user access to one particular table in display mode ?
Ans: If the system is BASIS 700, we can use the authorization object S_TABU_NAM.
In this auth. Object, we can maintain the values for required activity and the
table name.
If the system version is lower than 700, and the table is z* table then
Create a new authorization Group using SE54.
Assign the table in question to the newly created authorization Group in table
TDDAT using SM30.
If the table is SAP standard table then we can restrict user access by creating new
tcode in SE93.
73) There are two options in the PFCG while modifying a role. One change
authorizations and another expert mode-what is the difference between them?
Ans: Change authorization: This option we will use when we create new role and
modify old role
Edit old status(The last saved authorization data for the role is displayed. This
is not useful if transactions in the role menu have been changed.)
Read old data and merge with new data(If any changes happen in SU24 Authorizations
we have to use this).
74) If we give Organizational values as * in the master role and want to restrict
the derived roles for a specific country, how do we do?
Ans: We have to maintain org level for the country based on the plant and sales
area etc in the derived Role.
76) What is the table name to see the authorization objects for a user?
Ans: USR12
83) How to copy 100 roles from a client 800 to client 900?
Ans: Add all 100 roles as one single composite Role and Transfer the Composite role
automatically the 100 Role will transfer to the target client (Using SCC1)
84) User reports that they lost the access. We check in SUIM and no change docs
found. How do you troubleshoot.
Ans: Maybe user buffer full or role expired.
86) How can we maintain Organizational values? How can we create Organizational?
Ans: PFCG_ORGFIELD_CREATE in t-code SA38
87) I want to see the list of roles assigned to 10 different users. How do you do
it?
Ans: Goto se16 > agr_users then mention the 10 users name
Goto SUIM > role by complex selection > type user names.
89) What is the main purpose of Parameters Groups & Personalization tabs in SU01
and Miniapps in PFCG?
Ans: Parameter tab: it’s used to auto fills some of the values during the creation
of orders.
94) How do you find user-defined, security parameters for system default values?
Ans: By using t-code RSPFPAR we can ding user-defined and system default security
parameters.
101) How to find the email ids if given a list of users (say 100)?
Ans: Execute the t-code SE16
Enter the table name as USR21.
Upload the list of users using multiple selection option and execute. This will
give us the list of users and their respective person numbers
Extract this data to excel sheet
Now, go back to SE16 and enter table name ADR6
Upload the list of person number extracted from table USR21 and execute
Now, table ADR6 will give us the list of person numbers and their email ids.
Download the list in excel and perform V-look up in excel to map the email ids of
users with their SAP IDs.
102) Which entities are not distributed while distributing the authorization data
from master role to derived roles?
Ans:During the distribution of authorization data from master role to derived
roles, Organizational values and user assignment are not distributed.
103) What are the authorization groups and how to create them?
Ans: Authorization groups are the units comprising of tables for common functional
area.
Generally, each table is assigned to a authorization group due to this reason we
need to mention the value of authorization group while restricting the access to
table in authorization object S_TABU_DIS.
The authorization group can be created by using the t-code SE54. The assignment of
tables to authorization group can be checked by using table TDDAT.
106) What is the use of ST01? What are the return codes of t-code ST01.
Ans: Below are the return codes of ST01 :
107) HR Security: What are the objects for HR and what is the importance of each HR
object
Ans: P_PERNR object is used by a Person to see data related to his Personal Number
-----------------------------------------------------------------------------------
-------------------------------------------------------------------------
1) What are the components that are configured in SAP Front End Server?
Ans: Configure ABAP Front-end server includes- Configure SAP NetWeaver Gateway,
Configure the Central UI Add-On, Configure SAP Fiori Launchpad.
Single Point of maintenance for UI issues- such as browser support and updated
version of SAP UI5 libraries.
4) To enable communication between the front-end ABAP and back-end ABAP server,
which communication type is used?
Ans: Trusted RFC.
5) Transaction Apps, Factsheets and Analytical Apps require which of the SAP system
to run?
Ans: Transaction Apps are only apps that don’t have to run on Hana system. They can
run on any Database. All factsheets, Analytical apps and Small Business Apps run on
SAP Hana. Only Fact sheet requires Search Models. Only Analytical Apps requires
Hana XS Engine and KPI Framework is needed for Smarts Business Apps.
8) Which service is used by SAP Fiori Launchpad designer to read and assign
transport request?
Ans: UI2/TRANSPORT- Used by SAP Fiori Launchpad designer to read and assign
transport request.
9) How data flow happens in SAP Fiori Launchpad? Explain the steps.
Ans: Sequence of steps −
LPD_CUST
Static/Dynamic Launcher
10) What are the different RFC authorization objects in SAP Fiori?
Ans: Authorization Object S_RFCACL
Definition
Defined Fields
RFC_EQUSER − Flag that indicates whether the user can be called by a user with the
same ID (Y = Yes, N = No)
RFC_TCODE − Calling transaction code.
ACTVT − Activity
12) What are the configuration tasks that need to be performed on Front End server
as per different app types?
Ans: We need to perform certain configuration tasks on front end server which are
specific to app type. We need to Activate OData Services for transactional apps and
Factsheets but not for Analytical apps. For analytical apps we need to configure
access to SAP HANA data.
13) What are the different app launched tile types in SAP Fiori?
Ans: Static − It shows predefined static content (text, icon).
News Tile − Flips through news messages according to the configuration of the tile.
14) What are the different OData services that are required for SAP Fiori
Launchpad?
Ans: OData services have to be enabled in SAP Net Weaver gateway to establish
mapping between technical OData name and the corresponding back-end service. In
order to setup SAP Fiori Launchpad and Launchpad designer, we have to activate 5
specific OData Services.
/UI2/PAGE_BUILDER_CONF
/UI2/PAGE_BUILDER_PERS
/UI2/PAGE_BUILDER_CUST
/UI2/INTEROP
/UI2/TRANSPORT
15) What are the different options in SAP Fiori Launchpad design?
Ans: 1) COnfiguration Layer.
2) Customizing layer.
/UI2/PAGE_BUILDER_PERS
/UI2/INTEROP
/UI2/LAUNCHPAD
17) For write access to the UI Theme Designer (create, update, delete themes),
which authorization object should be assigned?
Ans: Authorization object: /UI5/THEME
ACTVT(Activity):02(Change) and
18) To be able to use the UI Theme Designer, which Internet Communication Framework
ICF nodes should be activated?
Ans: To be able to use the UI Theme Designer, Activate the following Internet
Communication Framework (ICF) service nodes −
/sap/public/bc/themes
/sap/bc/theming
19) Which components has to redefine while extending Gateway layer of SAP Fiori
Application?
Ans: IW_BEP on Business Suite
20) In SAP NetWeaver 7.31 ep1, which roles should be assigned to the Fiori
Launchpad administrator?
Ans: The Launchpad administrator must have the PFCG role SAP_UI2_ADMIN assigned.
SAP_UI2_ADMIN is a composite role containing the following release-dependent roles
− SAP_UI2_ADMIN_700 for SAP NetWeaver 7.0 SAP_UI2_ADMIN_702 for SAP NetWeaver 7.0
enhancement package 2 SAP_UI2_ADMIN_731 for SAP NetWeaver 7.0 enhancement package 3
and SAP NetWeaver 7.3 enhancement package 1.
-----------------------------------------------------------------------------------
--------------------------------------------------------------------------
4) In what way the tracing for security topics like authorization, authentication
and login can be activated?
Ans: With the following parameter in general an authorization trace can be
activated on a temporary basis:
To the normal service trace files further authorization information will be written
as a consequence. It may be sufficient to set the parameter temporarily in order to
trace connection issues.
The Privileges can be granted to the user directly or indirectly (through roles).
All Privileges assign to users are combined as a single unit.
When a user tries to access any SAP HANA Database object, HANA System performs
authorization check on the user through user roles and directly grants the
privileges.
When requested Privileges found, HANA system skips further checks and grant access
to request database objects.
Object Privileges Object Privileges are SQL privileges that are used to give
authorization to read and modify database objects. To access database objects user
needs object privileges on database objects or on the schema in which database
object exists. Object privileges can be granted to catalog objects (table, view,
etc.) or non-catalog objects (development objects). Object Privileges are as below
–
CREATE ANY
UPDATE, INSERT, SELECT, DELETE, DROP, ALTER, EXECUTE
INDEX, TRIGGER, DEBUG, REFERENCES
Analytic Privileges Analytic Privileges are used to allow read access on data
of SAP HANA Information model (attribute view, Analytic View, calculation View).
Privileges on User It is an SQL Privileges, which can grant by the user on own
user.
-----------------------------------------------------------------------------------
--------------------------------------------------------------------------