SAP Security Challenge - November 2017

Complete our November Challenge and enter the draw to win a $50 Dollar gift card from Amazon.

Your name:
Your email:
Can SAP authorizations go beyond the transaction code level?
When do you use table AGR_1251 and for what?
Where can we find the user's last logon details?
Transaction is used to maintain authorizations default values that are checked during the execution of a particular transaction code.
Which tools are part of the initiative Compliant Identity and Role Management (CIRM) from SAP and its partner Xiting?
Which transaction do you use to lock or unlock transactions globally?
What's the default password for SAP standard user SAP* in new clients (others than 000, 001, 066)?
An RFC ABAP Type 3 connection is created between two systems using SM59. During an RFC call, what authorization object will definitely be checked in the target system?
How can we find "parameterized" transaction? For example: how can we find that SMY1 is a parameter transaction of SM34?
What are the cons of indirect role assignments? In an indirect role assignment scenario, authorization roles (and profiles) are attached to positions, employees, or organizational units in the organization structure. The end user gains access through the assignment to the position in the HR organization.

Alessandro Banzer

Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control and SAP Security.