Top 41 SAP Security Interview Questions and Answers
Top 41 SAP Security Interview Questions and Answers
Top 41 SAP Security Interview Questions and Answers
Ans. SAP stands for Systems, Applications, and Products in the data processing. SAP security is a module that protects
the SAP data and applications from unauthorized use and access. It refers to providing the right access to business users
according to their authority or responsibility. Permissions are given as per their roles in the organizations or
departments.
To stand out with this SAP security interview question, do mention that it has three areas:
Ans. A T-code (or transaction code) is used to access functions or a running program in an SAP application. Some of the
SAP security T-codes are:
Ans. This is one of the basic SAP security interview questions. In SAP systems, users are categorized according to their
purpose. This is important since while creating a new user ID, the administrator has to specify the user type. Following
are the different types of users in SAP
It is used for an individual user. During a dialog logon, the system checks
Dialog User (A) for expired/initial passwords. The user can change his or her password.
Several dialog logons are checked and logged.
These are non-interactive users and are used to perform some system
System User (B)
activities like ALE, background processing, Workflow, TMS, and CUA.
Reference User (L) It is like a System user. It involves a general, non-personally related user.
Ans. The first step is to check if logging is activated for a table using t-code SE13. If it is enabled then we can see the table
logs with the t-code SCU3.
Ans. Role refers to the group of t-codes that is assigned to execute particular tasks.
Ans. Each role in SAP requires privileges to execute a function, which is known as authorization.
Ans. A role and profile go hand-in-hand. When a role is created, a profile is automatically created.
Q10. What is the difference between a single role and a composite role?
Ans. A single role is a container that collects transactions and generates an associated profile. A composite role is a
container that collects different roles.
Q11. Differentiate between authorization object and authorization object class?
Ans. An authorization object is a group of authorization fields and is related to a particular activity, while an
authorization object class comes under the authorization class and is grouped by function areas.
Ans. In a role, the maximum number of profiles is 312 and the maximum number of objects is 170.
Q13. How to find out who has deleted users in the system?
Ans. To find out who has deleted users in the system, first debug or use RSUSR100 to find the info. Then run transaction
SUIM and download the Change documents.
Q14. Can you change a role template? What are the three ways to work with a role template?
Q15. What are the authorization objects required to create and maintain user records?
Ans. The following authorization objects are required to create and maintain user records:
Q16. How can you delete multiple roles from QA, DEV and Production System?
Ans. The following steps should be taken to delete all the roles from QA, DEV and Production System:
USOBT_C USOBX_C
It also includes the checks which are present It includes the default set values that need to
in the profile generator. be present in the profile generator.
Q20. Which t-code can be used to delete old security audit logs?
Ans. The t-code SM-18 can be used to delete old security and audit logs.
Ans. The main tabs available in PFCG are description, menu, authorization, and user. The functions of these tabs are:
• Description: Used to describe the changes done, such as details related to the role, the authorization object, and
the addition or removal of t-codes.
• User: Used to adjust user master records and assign users to the role.
Ans. USER COMPARE compared the user master record so that the produced authorization profile can be entered in the
user master record.
Q24. What is the difference between CM (Check/Maintain), C (Check), N (No Check), and U (Unmentioned)?
Ans. This is an important SAP Security interview question. The differences you can mention are:
PG creates an PG does not create The PG does not create The PG does not create
authorization for this authorization for this authorization for this authorization for this
object. Field values are object. Field values are object. Field values are object. Field values are
displayed. not displayed. not displayed. not displayed.
Ans. A user buffer is formed when a user signs on to an SAP system. This user buffer contains authorizations for that
particular user. Every user has his or her own user buffer. A user buffer is a monitoring tool. It means that no further
action can be taken from within this transaction. It can be used to analyze for a particular user or reset the buffer for the
user. A user can display his or her own user buffer using the t-code SU56.
Q26. What are the values for user lock?
• 00 – not locked
Ans. For this SAP security interview question, you can mention that you can create a user group in the SAP system by
following the below steps:
• A new screen will open up. Now provide a name for the new user group in the text box.
Q28. Which parameter is used to control the number of entries in the user buffer?
Ans. To control the number of entries in the user buffer, we use the profile parameter.
“Auth/auth_number_in_userbuffer”.
Q29. When a background user faces problems, how will you troubleshoot them?
Ans. System Trace ST01 can be used to troubleshoot problems for background users.
Q31. List the pre-requisites before assigning the SAP_ALL to users even in the case of approval from the authorization
controllers.
Q32. What should be considered before executing the Run System Trace?
Ans. In case you are tracing the batch user ID or CPIC, then before executing Run System Trace, ensure that the id has
been assigned to SAP_NEW and SAP_ALL. The user will be able to execute the job without authorization check failure.
Ans. It is a report used for the purpose of user master comparison. It also clears expired profiles from user master
record.
Ans. To directly execute it, you can use the PFUD transaction code.
Ans. USR40 table is used for storing illegal passwords. It stores the pattern of words that cannot be used as passwords.
Ans. It is the default SAP security product. Its primary use is for conducting any encryption function in SAP systems. Open
SSL and CommonCryptoLib are two libraries.
Ans. To answer this SAP security interview question, describe how a profile is created.
A profile version is created when the existing user changes their profile. The original profile still exists alongside with the
new version but there is an individual number or identifier for each new profile version in a sequential manner.
Ans. CUA stands for Central User Administrator. This useful tool for SAP ABAP applications allows the Security
Administrator to manage multiple accounts on multiple clients.
Ans. The exact steps and fields may vary depending on your organization’s SAP system version, configuration, and specific
security roles assigned to your user account. But these are the main steps.
• Access the SAP system: Log in to the SAP system using your user ID and password.
• Enter the appropriate transaction code in the command field at the top of the SAP screen to launch the
transaction for creating PRT master records. The transaction code for creating PRT master records may vary
depending on the SAP system and configuration, but it is often “IR01” or “IR02.” In the PRT master record
creation screen, enter the relevant information for the PRT. This typically includes: PRT Type, PRT Number,
Description, Plant, Storage Location, Status, etc.
• Once you have entered all the required information, click on the “Save” button to create the PRT master record.
The system will generate a unique PRT number and store the record in the database.
• Depending on your organization’s requirements, you may need to perform additional configurations for the PRT
master record, such as assigning it to a work center, creating task lists, or linking it to a material.
• After creating the PRT master record, it is recommended to perform testing and validation to ensure that the PRT
functions correctly within the SAP system. This may involve executing relevant transactions or processes that
utilize the PRT.