Sunday, 19 July 2015

SUIM Reports/ABAP Reports Required for SAP Security Team


RSUSR000     Currently Active Users    
      
RSUSR002     Users by Complex Selection Criteria

RSUSR002_ADDRESS     Select users by address data

RSUSR003     Check the Passwords status of Users SAP* and DDIC in All Clients

RSUSR004     Restrict User Values to the Following Simple Profiles and Auth. Objects

RSUSR005     List of Users with Critical Authorizations

RSUSR006     Locked Users and Users with Incorrect Logons

RSUSR007     Display Users with Incomplete Address Data

RSUSR008     Critical Combinations of Authorizations at Transaction Start

RSUSR008_009_NEW     List of Users with Critical Authorizations

RSUSR009     List of Users With Critical Authorizations

RSUSR010     Transactions for User, with Profile or Authorization

RSUSR011     Lists of transactions after selection by user, profile or objects

RSUSR012     Search authorizations, profiles and users with specified object values

RSUSR020     Profiles by Complex Selection Criteria

RSUSR030     Authorizations by Complex Selection Criteria

RSUSR040     Authorization Objects by Complex Selection Criteria

RSUSR050     Comparisons

RSUSR060     Where-used lists

RSUSR061     Enter Authorization Fields

RSUSR070     Roles by Complex Selection Criteria

RSUSR080     Users by License Data

RSUSR100     Change Documents for Users

RSUSR101     Change Documents for Profiles

RSUSR102     Change Documents for Authorizations

RSUSR200     List of Users According to Logon Date and Password Change

RSUSR300     Set External Security Name for All Users

RSUSR301     Fill non-checking transactions with auth.object S TCODE

RSUSR302     Delete authorization check on object S TCODE from table TSTCA

RSUSR304     Reload Table TSTCA From Table TSTCA_C

RSUSR400     Test Environment Authorization Checks (SAP Systems Only)

RSUSR401     Report to give all SAPCPIC users profile S_A.CPIC

RSUSR402     Download user data for CA manager from Secude

RSUSR403     Assign Profile S_A.CPIC to User SAPCPIC in Current Client

RSUSR404     Conversion Program for Authorizations of Basis Development Environment

RSUSR405     Reset all user buffers in all clients (uncritical)

RSUSR406     Automatically Generate Profile SAP_ALL

RSUSR406_OLD     Automatically Generate Profile SAP_ALL

RSUSR408     XPRA: Conversion of USOBX-OKFLAG, USOBX-MODIFIED for upgrade tool

RSUSR409     Transfer all translated titles to generated transaction codes

RSUSR421     Clean-up report: TSTC-CINFO if no check in TSTCA

RSUSR500     User Administration: Compare Users in Central System

RSUSR500D     Report RSUSR500D

RSUSR998     Call Reporting Tree Info System

RSUSREXT     Enter Correct SNC Names in Table View VUSREXTID (from SAP R/3 4.5)

RSUSREXTID     Enter Correct SNC Names in Table View VUSREXTID (from SAP R/3 4.5)

RSUSRLOG     Log Display for Central User Administration

RSUSRSCUC     CUA: Synchronization of the Company Addresses

RSUSRSUIM     User Information System

RSUSR_S_USER_SAS     Activate Authorization Object S_USER_SAS

RSUSR_S_USER_SAS_01     Complete Authorization Data for S_USER_SAS in Roles

RSUSR_S_USER_SAS_02     Convert Authorization Defaults

RSUSR_SYSINFO_PROFILE     Report cross-system information/profile

RSUSR_SYSINFO_ROLE     Report cross-system information/role

RSUSR_SYSINFO_ZBV     Report cross-system information/CUM

Wednesday, 15 July 2015

Critical Authorization Objects



S.No
Auth.Object
Description
1
S_TABU_DIS
Used to protect tables using authorization groups with activity

2
S_TABU_CLI
Auth object used to protect cross client tables

3
S_TABU_LIN
Auth object used to tables based on line items

4
S_TABU_NAM
New auth object to table access based on names

5
S_PROGRAM
Used to run ABAP reports/programs via SA38

6
S_DEVELOP
Auth object used to control ABAP objects or debug access

7
S_USER_AGR
Used to control roles

8
S_USER_AUT
Checked during authorization maintenance

9
S_USER_GRP
Used control user groups

10
S_USER_PRO
Used for profile maintenance

11
S_BDC_MONI
Used to protect batch input monitoring

12
S_BTCH_JOB
Used for background job monitoring and administration

13
S_BTCH_ADM
Used for background job administration

14
S_BTCH_NAM
User level control for background job scheduling 

15
S_SPO_ACT
Used for spool administration which controls S_ADMI_FCD

16
S_ADMI_FCD
Basis administration like spool and monitoring

17
S_SPO_PAGE
Used to control name of the o/p device and number of pages

Saturday, 11 July 2015

SAP Security Interview Questions And Answers Part - 3


1. What is reference user type?
Reference username used to assign delegation/temp access to a user
i.e example a user is going for a holiday during that time we need to assign another employee to take responsibility to avoid business impact, so that can be achieved using reference user type, You can assign a ref user in roles tab

2. How do you create an authorization object?
Go to SU21 and select authorization class and create an authorization object and maintain authorization fields and maintain authority check for it

3. Is it possible to convert authorization fields into organization fields and what are the exception/restrictions for it?
ABAP report PFCG_ORGFIELD_CREATE used to convert authorization fields into ORG level, similarly report PFCG_ORGFIELD_DELETE used to convert org level field into non org fields

a.    Only create Organizational level fields before you start setting up your system. If you create organizational level fields later, the authorization data for roles may have to be post processed.

b.    The fields "Activity", "ACTVT" and "Transaction code", "TCD" cannot be converted into an organizational level field.
Refer: OSS note 323817

4. How do you extract user email address?
USR21 and ADR6 tables are used to get user email address in SAP.

Enter the username in USR21 tcode and execute it, now you will get “person number” and copy it which users email address required and enter those person numbers to ADR6 table and execute it and you will get the email address

5. How to extract parent and derived role relation?
Table AGR_DEFINE used to check parent and derived role relationship

6. How do you create authorization groups?
SE54 tcode used to create authorization groups for tables and programs

7. How do you restrict a table to particular person or team?
Create an authorization group for the table which needs to be protected and add the auth group to S_TABU_DIS auth object filed value and give it activities like, create, delete, display, etc..

8. In which table you will check authorization group created for a particular table?
TBRG table used to check available authorization groups and TBRGT holds auth group with description

9. What are the ORG fields in sap?
1.    Company code
2.    Controlling area
3.    Division
4.    Sales organization
5.    Plant
6.    Business area
7.    Purchasing organization
8.    Credit control area
9.    Account type


10. What are status light in authorization page for authorization fields in PFCG?
1.    Red – Org level not maintained
2.    Yellow – atleast one filed left open
3.    Green – all fields are maintained

11. What is the difference between R/3 security and BW security?
R/3 security mainly based on transaction and controlled via authorization objects using profiles and roles
BW security is mainly based on analysis authorization using RSECADMIN tcode and very few tcodes compare to R/3 and we should secure Info objects, info cubes, ODS and quires

BW authorizations are primarily focused on data not on transaction codes and divided into two main areas authorization for administrator workbench and authorization for business explorer
Authorization objects for field level security in reporting are created as and when needed.

12. Which authorization object gives end user to execute/view a query in BW?
-    S_RS_COMP
-    S_RS_COMP1
-    S_RS_FOLD

13. What is the use of SU24 tcode?
SU24(check indicator) holds the relationship between tcode and authorization objects in customer tables USOBX_C and USOBT_C tables which values are pulled during role creation
SU24 used to maintain all the objects that are checked during tcode execution

14. How do you check authorization check for a tcode?
Check SU24 for authorization object and its proposal also we can check the ABAP report as well

15. What is the authorization object which gives developer debug authorization?
S_DEVELOP with activity 01, 02 or 03

16. How do you secure/give access to a custom report to users without  giving SE38 tcode access?
Create an authorization group for that report to secure it and give SA38 tcode authorization for execution of the custom report or create a custom transaction code and maintain authority check and assign to users via role.

17. How do you create a custom tcode?
SE93 is the tcode used to create a custom tcode

18. How do you create a transport request?
SE01, SE09, SE10 tcodes are used to create a transport request and also we can create during customization time like, PFCG, SE38, BD54, etc..

19. What are the types of transport requests?
-    Custom transport request
-    Workbench transport request
-    Transport of copies
-    Relocation

20. What is the difference between custom and workbench transport requests?
-    Workbench requests are those involve changes to cross client customizing and repository objects, those objects are independent of the client and the requests are used to transport changed repository objects and changed system settings from cross client tables
-    Customizing requests involve changes to client dependent objects, so custom transport request used to copy and transport requests that are client specific


21. How do you schedule a background job
SM36 used to schedule background jobs

22. Have you worked on upgrade and steps involved?
Yes
2A. Compare with SAP values
2B. Compare affected transaction codes
2C. Roles to be checked
2D. Display changed transaction codes

23. What is expert mode in PFCG?
Expert mode in PFCG used to maintain existing roles it has following options
-    Delete and recreate authorization and profiles
-    Edit old status
-    Read old status and merge with new data

24. Which table you can check the relation between composite roles and child roles?
AGR_AGRS

25. What are the license types you assign to end users while creating it?
-    Application professional users
-    Application limited professional users
-    Application ESS user

26. You are not allowed to assign any roles to user profile further what would be the reason for it?
User must have exceeded the limitation for profiles assignment i.e 312

27. Have you worked with auditors?
Yes with internal auditors and explain it

28. Which table used to view roles and org level values?
Table AGR_1252 maintains relationship between roles and org field values

29. Which table used to view roles and authorization objects and its values?
Table AGR_1251 maintains relationship between roles, authorization objects and its field values

30. Where do you delete old audit logs?
SM18

31. Where do you look lock entries?
SM12

32. Which authorization object gives you SM12 authorization other than S_tcode?
S_ENQUE

33. Where do you reset user buffer?
SU56

34. What is the mandatory field in address tab in SU01?
Last Name

35. How do you lock a tcode?
SM01 tcode used to lock a tcode

36. Which table stores all ABAP reports?
TRDIR

37. How do you lock users who didn’t log in to SAP more than 90 days?
USR02 tables we can get last login date and time

38. Which table holds all valid activity fields?
TACTZ

39. ABAP report which is used for user reconciliation?
PFCG_TIME_DEPENDENCY

40. Table which holds all possible authorization fields as variables
USVAR

Part -1
Part - 2