Security Questions
Security Questions
us
Q. Can we convert Authorization field to Org, field
A. Authorization field can be changed to Organization field using PFCG_ORGFIELD_CREATE
or ZPFCG_ORGFIELD_CREATE
Use SE38 or SA38 to run the above report.
• Organizational level fields should only be created before you start setting up your
system. If you create organizational level fields later, you might have to do an impact
analysis. The authentication data may have to be postprocessed in roles.
• The fields "Activity", "ACTVT" and "Transaction code", "TCD" cannot be converted into
an organizational level field.
In addition, all affected roles are analyzed and the authorization data is adjusted. The values
of the authorization field which is now to become the organizational level field are removed
and entered into the organizational level data of the role.
Note: Table for Org Element- USORG
Refer to Note 323817 for more detail.
Now you can login to the client using sap* and password pass
www.placementpapers.us
www.placementpapers.us
auth/number_in_userbuffer.
End User
Role Administration
User Administration
www.placementpapers.us
www.placementpapers.us
Maintenance --> Edit Profiles
Manually
SU03 Tools --> Administration --> User Manually create authorizations
Maintenance --> Manual
Maintenance --> Edit
Authorizations Manually
www.placementpapers.us
www.placementpapers.us
System configuration
Authorization Object
Audit
Table maintenance
Table Group
www.placementpapers.us
www.placementpapers.us
AL02 Database Alert Monitor SE15 ABAB/4 Repository Info SSM1 SAP and
System Company Menu
administration
AL03 Operating System Alert SE30 ABAP/4 Run time ST01 System Trace
Monitor Analysis
AL04 Monitor Call Distribution SE38 ABAP/4 Editor ST02 Setup/Tune
Buffers
AL05 Monitor Current SE54 Generate Table View ST03 Performance
Workload SAP statistics,
Workload
AL06 Performance: SE61 R/3 Documentation ST04 Select Database
Upload/Download Activities
AL07 Early Watch Report SE80 ABAP/4 Development ST05 SQL Trace
Workbench
AL08 Users Logged On SE91 Maintain Messages ST06 Operating
System Monitor
AL10 Download to Early SE92 Maintain System Log ST07 Application
Watch Messages Monitor
AL11 Directories SE93 Maintain Transaction ST08 Network Monitor
Codes
AL12 Display Table Buffer SH01 Online Help: F1 Help ST09 Network Alert
(Exp session) Server Monitor
AL13 Display Shared SH03 Call Extended Help ST10 Table Call
Memory (Expert mode) Statistics
AL15 Customize SAPOSCOL SICK Installation Check ST11 Display
destination Developer
Traces
AL18 Local File System www.placementpapers.us
SLDB Logical Databases ST12 Application
Monitor (Tree Structure) Monitor
AL19 Remote File System SLW4 Translation: Application ST14 Application
Monitor Hierarchy Analysis
AL20 Early Watch Data SM01 Lock Transactions ST22 ABAP/4 Runtime
Collector List Error Analysis
DB01 Analyze Exclusive Lock SM02 System Messages STAT Local
Waits Transaction
Statistics
DB02 Analyze Tables and SM04 User Overview STDR TADIR
Indexes Consistency
Check
DB03 Parameter Changes in SM12 Display and Delete STUN Performance
DB Locks Monitor Menu
DB11 Early Watch Profile SM13 Display Upgrade SU01 Maintain User
Maintenance Records Records
DB12 Overview of Backup SM21 System Log SU02 Maintain
Logs Authorization
Profiles
DB13 Database SM31 Table Maintenance SU03 Maintain
Administration Authorizations
Calendar
DB14 Show DBA Action Logs SM35 Batch Input Monitoring SU10 Mass Changes
to User Master
Records
PFCG Profile Generator – SM36 Background Job SU12 Mass Changes
Activity Groups Scheduler to User Master
Records
www.placementpapers.us
www.placementpapers.us
RZ01 Job Scheduling Monitor SM37 Background Job SU20 Maintain
Overview Authorization
Fields
RZ02 Network Graphics for SM38 Queue Maintenance SU21 Maintain
SAP Instances Transaction Authorization
Objects
RZ03 Presentation, Control SM39 Job Analysis SU22 Auth Objects
SAP Instances Usage in
Transactions
RZ04 Maintain SAP Instances SM50 Workprocess Overview SU24 Maintain Profile
Generator
Tables
RZ06 Alert Thresholds SM51 List of SAP Servers SU25 Copy SAP to
Maintenance Customer Prof
Gen Tables
RZ08 SAP Alert Monitor SM63 Display/Maintain SU30 Overall
Operation Mode Sets Authorization
Checks
RZ10 Maintenance of Profile SM64 Release of an Event SU50 Maintain User
Parameters Defaults
RZ11 Profile Parameters SM65 Background Processing SU51 Maintain User
Analysis Tool Address
SAR Maintain Transaction SM66 System-wide Work SU52 Maintain User
Codes Process Overview Parameters
SARA Archive Management SM67 Job Scheduling SU53 Analyze
Authorization
Error
SCAT Computer Aided Testwww.placementpapers.us
SM68 Job Administration SU56 Display list of
Tool User
Authorizations
SCC0 Client Copy SMGW Gateway Monitor SVER ABAP/4
Verification
SCU3 Table History SMLG Logon Groups SVMC Start View
Maintenance
with Memory
SD11 Data Modeler SMX Display Own Jobs SWT0 Configure
Workflow Trace
SDBE Matchcode Objects SOFF SAPoffice: Area Menu SWU8 Technical Trace
(test) On/Off
SE01 Transports and SP00 Spool and Related SWU9 Display
Correction System Areas Technical Trace
SE02 Environment Analyzer SP01 Output Controller SWUD Diagnostic Tools
SE03 Transport Utilities SP11 TemSe Directory SWUE Initiate Event
SE07 Transport System SP12 TemSe Administration SWUF Workflow
Status Display Monitor
SE09 Workbench Organizer SPIT Output Controller SWUH Test Method
SE10 Customizer Organizer SPAD Spool Administration SWWD Switch on Work
Item Error
Monitoring
SE11 ABAP/4 Dictionary SPAM SAP Patch Manager SYNT Display Syntax
Maintenance Trace Output
SE12 ABAP/4 Dictionary SPAT Spool Administration - TU01 Call Statistics
Display test
SE13 Maintain Technical SPDD Display Modified DDIC TU02 Active Instance
Settings (Tables) objects Profile
www.placementpapers.us
www.placementpapers.us
parameters
www.placementpapers.us
The table USOBT_C defines for each transaction and for each authorization object which
default values an authorization created from the authorization object should have in the Profile
Generator.
www.placementpapers.us
www.placementpapers.us
1. Dialog users are used for individual user. Check for expired/initial passwords Possible
to change your own password. Check for multiple dialog logon
2. A Service user - Only user administrators can change the password. No check for
expired/initial passwords. Multiple logon permitted
3. System users are not capable of interaction and are used to perform certain system
activities, such as background processing, ALE, Workflow, and so on.
4. A Reference user is, like a System user, a general, non-personally related, user.
Additional authorizations can be assigned within the system using a reference user. A
reference user for additional rights can be assigned for every user in the Roles tab.
• Derived roles refer to roles that already exist. The derived roles inherit the menu
structure and the functions included (transactions, reports, Web links, and so on) from
the role referenced. A role can only inherit menus and functions if no transaction
codes have been assigned to it before.
• The higher-level role passes on its authorizations to the derived role as default values
which can be changed afterwards. Organizational level definitions are not passed on.
They must be created anew in the inheriting role. User assignments are not passed on
either.
• Derived roles are an elegant way of maintaining roles that do not differ in their
functionality (identical menus and identical transactions) but have different
characteristics with regard to the organizational level. Follow this link for more info
www.placementpapers.us
Q What is a composite role?
• A composite role is a container which can collect several different roles. For reasons of
clarity, it does not make sense and is therefore not allowed to add composite roles to
composite roles. Composite roles are also called roles.
• Composite roles do not contain authorization data. If you want to change the
authorizations (that are represented by a composite role), you must maintain the data
for each role of the composite role.
• Creating composite roles makes sense if some of your employees need authorizations
from several roles. Instead of adding each user separately to each role required, you
can set up a composite role and assign the users to that group.
• The users assigned to a composite role are automatically assigned to the
corresponding (elementary) roles during comparison. Follow the link to learn more
www.placementpapers.us
www.placementpapers.us
• Organizational level fields should only be created before you start setting up your system. If you
create organizational level fields later, you might have to do an impact analysis. The
authentication data may have to be postprocessed in roles.
• The fields "Activity", "ACTVT" and "Transaction code", "TCD" cannot be converted into an
organizational level field.
www.placementpapers.us
In addition, all affected roles are analyzed and the authorization data is adjusted. The values of the
authorization field which is now to become the organizational level field are removed and entered into
the organizational level data of the role.
Note: Table for Org Element- USORG
Refer to Note 323817 for more detail.
Now you can login to the client using sap* and password pass
You can also get this information directly from table, if you have access to SE16 or SE16N. Execute
SE16N
Table AGR_1251
Object S_TCODE www.placementpapers.us
VALUE (low) SU01
Q. How to find out all the roles for one composite role or a selection of composite roles?
A. Execute SE16N
Table AGR_AGRS
Composite roles You can put multiple composite roles using the more button
Q. How to find out all the derived roles for one or more Master (Parent) roles?
A. Execute SE16N
Table AGR_DEFINE
Q. How can I check all the Organization value for any role?
A. Execute SE16N
Table AGR_1252
Role Type in the role here and hit execute.
You can always download all the information to spreadsheet also using .
www.placementpapers.us
www.placementpapers.us
Q. How do I restrict access to files through AL11?
A. First create an alias. Go to t-code AL11 > configure > create alias. Let say we are trying to restrict
alias DIR_TEMP which is /tmp. Open PFCG and assign t-code AL11, and change the authorization for
S_DATASET as mentioned below
Activity 33
Physical file name /tmp/*
Program Name with Search Help *
If you have more than 16 users – Click on Authorization data and click on next to users and
Q. How to remove duplicate roles with different start and end date from user master?
A. You can use PRGN_COMPRESS_TIMES to do this. Please refer to note 865841 for more info.
Q. How come the users have authorization in PFCG, but user still complains with no
authorization?
A. Make sure the user master is compared. May be the there is a user buffer overflow
Also check the profile- Follow the instruction below.
SUIM > User by complex criteria.
www.placementpapers.us
Put the userid of user who is having issue.
Execute
Double click on the user id and expand the tree. Select the profile in question and see if the
authorization is correct or not. If not do the role reorg in PFCG and see if that helps.
Q. How to find all the users who got access to change and create users?
You can find all users who have access to create or change users using SUIM
Fill in the screen as shown below, and execute the query. There are couple of other authorization (
S_USER_AGR, S_USER_GRP and S_USER_PRO) you might want to check as well.
On the other hand you could just give the user SU01D, which is display user master.
www.placementpapers.us
www.placementpapers.us
www.placementpapers.us
Q. What is SAP?
A. SAP is the name of the company founded in 1972 under the German name (Systems, Applications,
and Products in Data Processing) is the leading ERP (Enterprise Resource Planning) software package.
Q. What is IDES?
A. International Demonstration and Education System. A sample application provided for faster learning
and implementation.
www.placementpapers.us
www.placementpapers.us
Q. What should be the approach for writing a BDC program?
A. Convert the legacy system data to a flat file and convert flat file into internal table. Transfer the flat
file into sap system called “sap data transfer”. Call transaction(Write the program explicitly) or create
sessions (sessions are created and processed ,if success data will transfer).
Q. What is Bex?
A. Bex stands for Business Explorer. Bex enables end user to locate reports, view reports, analyze
information and can execute queries. The queries in workbook can be saved to there respective roles in
the Bex browser. Bex has the following components: Bex Browser, Bex analyzer, Bex Map, Bex Web.
Q. What is Extractor?
A. Extractors is a data retrieval mechanisms in the SAP source system. Which can fill the extract
structure of a data source with the data from the SAP source system datasets. The extractor may be
able to supply data to more fields than exist in the extract structure.
www.placementpapers.us
www.placementpapers.us
Q. How do I change the name of master / parent role keeping the name of derived/child role
same? I would like to keep the name of derived /child role same and also the profile
associated with the child roles.
A. First copy the master role using PFCG to a role with new name you wish to have. Then you have to
generate the role. Now open each derived role and delete the menu. Once the menus are removed it
will let you put new inheritance. You can put the name of the new master role you created. This will help
you keep the same derived role name and also the same profile name. Once the new roles are done you
can transport it. The transport automatically includes the Parent roles.
· C (Check)
- An authority check is carried out against this object.
- The PG does not create an authorization for this object, so field values are not displayed.
- No default values can be maintained for this authorization.
· N (No check)
- The authority check against this object is disabled.
- The PG does not create an authorization for this object, so field values are not displayed.
- No default values can be maintained for this authorization.
·U (Unmaintained) www.placementpapers.us
- No check indicator is set.
- An authority check is always carried out against this object.
- The PG does not create an authorization for this object, so field values are not displayed.
- No default values can be maintained for this authorization..
You can start the user compare process from within the Profile Generator (User tab and User compare
pushbutton). As a result of the comparison, the profile generated by the Profile Generator is entered into
the user master record. Never enter generated profiles directly into the user master record (using
transaction SU01, for example)! During the automatic user compare process (with report
pfcg_time_dependency, for example), generated profiles are removed from the user masters if they do
not belong to the roles that are assigned to the user.
If you assign roles to users for a limited period of time only, you must perform a comparison at the
beginning and at the end of the validity period. You are recommended to schedule the background job
pfcg_time_dependency in such cases
www.placementpapers.us
www.placementpapers.us
Q. What happens to change documents when they are transported to the production system?
A. Change documents cannot be displayed in transaction 'SUIM' after they are transported to the
production system because we do not have the 'befor input' method for the transport. This means that if
changes are made, the 'USR10' table is filled with the current values and writes the old values to the
'USH10' table beforehand. The difference between both tables is then calculated and the value for the
change documents is determined as a result. However, this does not work when change documents are
transported to the production system. The 'USR10' table is automatically filled with the current values
for the transport and there is no option for filling the 'USH10' table in advance (for the history) because
we do not have a 'befor input' method to fill the 'USH10' table in advance for the transport.
Q. What is the difference between the table buffer and the user buffer?
A. The table buffers are in the shared memory. Buffering the tables increases performance when
accessing the data records contained in the table. Table buffers and table entries are ignored during
startup. A user buffer is a buffer from which the data of a user master record is loaded when the user
logs on. The user buffer has different setting options with regard to the 'auth/new_buffering' parameter.
To release Task
www.placementpapers.us
S_TRANSPRT
ACTVT=43, 03, 75
TTYPE=TASK
Other type:CLCP Client Transports
CUST Customizing Requests
DTRA Workbench Requests
MOVE Relocation transports
PATC Preliminary Corrections and Deliveries
PIEC Piece lists
TASK Tasks
TRAN Transport of copies
S_DATASET
PROGRAM=SAPLSTRF, SAPLSLOG
ACTVT=34
FILENAME=*
S_TRANSPRT
TTYPE=CUST
ACTVT=43, 03, 75
S_DATASET
PROGRAM=SAPLSCTS_RELEASE, SAPLSLOG, SAPLSTRF
ACTVT=33, 34
FILENAME=*
S_RFC
FC_TYPE=FUGR
RFC_NAME=STPA
ACTVT=16;
www.placementpapers.us
www.placementpapers.us
S_USER_AGR
ACT_GROUP= * (You can restrict by role, if proper naming convention is used)
ACTVT=01, 02, 03, 64 other fields below
01 Create or Generate
02 Change
03 Display
06 Delete
08 Display change documents
21 Transport
22 Enter, Include, Assign
36 Extended maintenance
59 Distribute
64 Generate
68 Model
78 Assign
79 Assign Role to Composite Role
DL Download
UL Upload
S_USER_GRP
CLASS=
ACTVT=22; 03
Other activity
01 Create or Generate
02 Change
03 Display
05 Lock
06 Delete
08 Display change documents
www.placementpapers.us
22 Enter, Include, Assign
24 Archive
68 Model
78 Assign
S_USER_TCD
TCD= * (Transaction in role)
S_USER_PRO
PROFILE= *
ACTVT=01, 06
Other activity
01 Create or Generate
02 Change
03 Display
06 Delete
07 Activate, generate
08 Display change documents
22 Enter, Include, Assign
24 Archive
S_TCODE
TCD=PFCG;
www.placementpapers.us
www.placementpapers.us
What are the different type of work process ?
The following work process in SAP R/3
• Dialog (D): each dispatcher needs at least 2 dialog work processes (not shown above)
• Spool (S): at least 1 per R/3 System (more than 1 per dispatcher allowed)
• Update (V): at least 1 per R/3 System (more than 1 per dispatcher allowed)
• Background (B): at least 2 per R/3 System (more than 1 per dispatcher allowed)
• Enqueue (E): exactly 1 per R/3 System (only 1 E work process is required and allowed)
• startsap calls the script startdb, which starts the database if it is not already started.
• startsap then starts the central instance.
• The R/3 System administrator can start additional instances and application servers. To start
the instances independently of the database, use the script startsap.
• startsap has the following options:
• startsap r3: Checks if the database is running; if it is, only the instance is started
• startsap db: Starts only the database
• startsap all: Default entry; starts both the database and the R/3 instance
• Before the R/3 System is stopped, the R/3 System administrator should check the:
• Check if any background jobs from any application server are active or have been triggered
externally. Use transaction SM37
• Check if the background work process BTC is running in any application server.
• Check if any update records are open when the system is stopped, the records are rolled back
and set to status init. At startup, the records are processed again.
• The administrator must decide whether to interrupt the jobs or wait until they are finished.
• Give system users advance warning of the system shutdown. To create a system message, you
can use transaction SM02.
• Before shutting down the system, use transaction SM04 to check whether users are still logged
on, and ask them to log off.
• The R/3 System administrator and administrators of external systems should also inform one
another about data transfers between their respective systems.
www.placementpapers.us
www.placementpapers.us
To check the SAP OS collector:
ps -ef | grep sapos
Q. The enqueue server is a single-point-of-failure in the SAP System. Can I guarantee high
availability for the Enqueue Server?
A. To guarantee this you must use the standalone Enqueue Server with the Replication Server. This is
described in the documentation Standalone Enqueue Server.
SAP note 524816 contains the prerequisites that must be fulfilled for using the standalone Enqueue
Servers with the Replication Server.
www.placementpapers.us
www.placementpapers.us
on the enqueue server can access the lock table. All work processes on other application servers
delegate their enqueue requests to a special enqueue work process on the enqueue server.
This procedure is configured automatically. The parameter line "rdisp/enqname =<application server
name>" in the default profile DEFAULT.PFL indicates which application server is currently acting as the
enqueue server. When an application server detects that its name matches the name of the enqueue
server, it creates the lock table and all of its work processes process enqueue requests inline. If an
application server detects that its name does not match the name of the enqueue server, it sends all
enqueue requests to the enqueue server.
Work processes of the type "enqueue" guarantee that incoming requests are processed immediately.
One enqueue process is usually sufficient. In very large SAP Systems with many application servers, a
second process can be beneficial. However, it is not expedient to define more than two enqueue
processes. If the transaction SM50 -> [CPU] shows that only the first enqueue process is being used,
the bottleneck is due to something else.
Q.Why is an enqueue work process required in a central system? Don't all work processes
have the same access to the shared memory and thus to the lock table?
A. Although the enqueue process is not used in a central system, it does not do any harm. Since almost
all customers install an application server sooner or later, problems will inevitably arise if the enqueue
process is missing. For this reason, the enqueue diagnosis function will output an error if an enqueue
process has not been configured.
Q. Are the locks in the lock table also set at the database level? If not, database functions
could be used to process objects locked in the SAP system.
A. Locks are not set on the database. The lock table is stored in the main memory of the enqueue
server.
Q. Is a lock table built if an enqueue work process is not started on the enqueue server in the
instance profile?
A. Yes, because the work processes on the enqueue server use the lock table directly, and not via the
enqueue process. The latter is only responsible for lock requests from external application servers.
www.placementpapers.us
Q.How can I find out who is currently holding the ungranted lock? In other words, how can
check the program after an ENQUEUE to determine which use is currently holding the lock so
that I can let him or her know?
A. When the ENQUEUE_... function module is returned, the name of the lock owner is listed in SY-
MSGV1.
Q. Can I use special characters in my lock argument (especially the ‘at’ sign (@))?
A. The ‘at’ symbol is used as a wildcard in SAP locks (enqueues). In other words, it can stand for any
other character during collision checks. For example, the parameter value 12345@ locks the quantities
123450 to 123459, 12345a to 12345z, and 12345A to 12345Z, and all other values with any special
character in the 6th character position.
This is described in detail in the section Lock Collisions.
In order to prevent the wildcard mechanism from being activated in SAP locks when it is not required,
you need to ensure when enqueue function modules are called that key value parameters do not contain
any wildcard characters.
If key values that you want to use to lock individual entities do contain wildcard characters, you have to
replace the wildcards with different characters before the enqueue is called.
www.placementpapers.us
www.placementpapers.us
Q. The Syslog often contains messages such as "Enqueue: total wait time during locking:
2500 seconds". How should I analyze this problem? Or is the entry not critical? (There are no
records of terminations or timeouts.)
A. The message is output for information purposes only but may indicate parallel processing errors with
ABAP programs. The specified wait time is the time that has elapsed since startup due to the use of the
WAIT parameter when the enqueue function module was called.
The WAIT parameter enables a lock attempt to be repeated a number of times, for example, so that the
update task does not have to be cancelled when a lock is set temporarily by other programs. The work
process remains busy between the lock attempts.
Q. Why do you get "GetProcessList failed: 80004005" error while starting SAP console
management
A. You have selected one of the Process List nodes in the tree. Then you closed MMC and clicked "Yes" in
the dialog "Save console settings to SAPMMC?". Now when you open again the MMC and those processes
are not started, you get this error.
Solution: Start MMC and select SAP Systems in the tree. Then close it and choose "Yes" in the dialog
"Save console settings to SAPMMC?". Now you won't get this annoying error on every start.
www.placementpapers.us
www.placementpapers.us