Sunday 2 April 2023

SAP Security Interview Questions and Answers

 

  • Fiori and HANA DB

  • 1.       What is different type of deployment model? - hub vs Embedded
  • 2.       Types of Apps in Fiori? - Fact vs analysis vs Navigation
  • 3.       What are groups and catalogue?
  • 4.       T-code to activate services in Fiori? /N/IWFND/MAINT_SERVICE
  • 5.       What is BPC and its type? standard and Embedded
  • 6.       Mandatory Basic services to load Fiori Launchpad? Page, builder and interoop
  • 7.       What is front end and backend services name? - iwsg(front) and iwsv(back)
  • 8.       What are diff type of role in HANA? -Design time and run time
  • 9.       Diff type of HANA privileges?
  • 10.   What is imp of checking grant role checkbox?
  • 11.   What is diff BW on HANA and Bw4HANA?
  • 12.   Why has SAP provided Spaces and Pages concept over Group and Catalogue?
  • 13.   What is the main advantage of using Spaces and Pages in Fiori? 

  • BI Security -
  • 1.       What is different level of access in hierarchy type characteristics?
  • 2.       Table for analysis auth?
  • 3.       What is Colon (:) and Hash (#) in AA?
  • 4.       Diff Auth object to execute query in BW? -  S_RS_COMP, S_RA_COMP1, A_RS_FOLD
  • 5.       Auth Object to Restrict Query access? S_RS_AUTH
  • 6.       step by step BI security? - https://blogs.sap.com/2009/02/26/step-by-step-sap-bi-security

  • ECC Security-
  • 1.       What is diff between su24 and su25?
  • 2.       Steps of su25?
  • 3.       Custom T-code creation process?
  • 4.       Auth objects used for table access.
  • 5.       Monthly activities to perform in system
  • 6.       Difference between S_PROGRAM and S_DEVELOP
  • 7.       Critical Auth object in security? S_ADMIN_FCD (Spool admin), S_DATASET (OS file)
  • S_DEVELOP (Debug access), S_USER_GRP, S_USER_AUTH, S_USER_PRO
  • 8.       Background job auth objects? S_BTCH_ADM, S_BTCH_NAM, S_BTCH_JOB
  • 9.       how to delete a role?
  • 10.   Difference between Data/Enabler role vs Task Role?
  • 11.   Imp tables for derived, composite and single roles?
  • 12.   What happen if we transport role along with user assignment? If user exist/not exist in receiver
  • 13.   What is difference between composite role and business Role
  • 14.   What are the audit activities u know
  • 15.   How to find user email id in ECC
  • 16.   What are diff types of licenses SAP Grant
  • 17.   What is diff between user group in address and group tab in SU01?
  • 18.   What is diff in SUIM for searching T-code in Transaction and Auth object using S_Tcode?
  • 19.   What is the use of personalization tab
  • 20.   What is diff between role and profile
  • 21.   What are different colour code in PFCG
  • 22.   diff modes of PFCG? - when they used
  • 23.   Diff type of Org fields in SAP
  • 24.   t-code to create custom T-code? - SE93
  • 25.   T-code to Transport? and how transport works in SAP? Data Files and Co-files
  • 26.   Type of Transport request? - Custom, Workbench, TOC

  • GRC
  • 1.       Critical action vs critical permission
  • 2.       What is risk? And its type
  • 3.       Diff stages of MSMP? And how it flows
  • 4.       Where to keep the notification mgs? Se61
  • 5.       What are fields present in end user personalization?
  • 6.       What are diff types of GRC Sync jobs
  • 7.       Max number of functions for a risk in GRC?5
  • 8.       How to make/process for custom risk in GRC?
  • 9.       What is diff between centralize and decentralize FFID
  • 10.   Advantage and disadvantage of types of FFID
  • 11.   How to make sure if user is not login with FFID in plugin system
  • 12.   What is Remediation and Mitigation
  • 13.   How to set the mitigation controller/ID? assign to Risk
  • 14.   What are FFowner, FF controller, FFusers
  • 15.   What are diff FF Parameter
  • 16.   What is diff between FF id based and Role based
  • Miscellaneous-
  • http://basisandsecurity.blogspot.com/2015/07/sap-security-interview-questions-and.html
Will Add further on this-

1 comment:

  1. Answers to few questions
    Workbench requests are those involve changes to cross client customizing and repository objects, those objects are independent of the client and the requests are used to transport changed repository objects and changed system settings from cross client tables
    Customizing requests involve changes to client dependent objects, so custom transport request used to copy and transport requests that are client specific


    Colon (:) – Colon is used to authorize access to aggregate data. For example, a person with : for 0COSTCENTER would be able to see aggregate data for all cost centers (cost center in the free characteristics section of the query) but would get an authorization error when trying to drill down on 0COSTCENTER\
    .Colon (:) authorization is also needed for all authorization relevant characteristics which are not used in a query.
    Hash (#) – While loading data into cubes, there might be some fields for which no values are maintained in the data source. Hash is used to authorize these undefined values as otherwise a full acces (*) would be needed for them.

    ReplyDelete