SAP Security Challenge – December 2018

by

SAP Security Challenge - January 2019

Complete our January Challenge and enter the draw to win a copy of the SAP System Security Guide. By completing the SAP Security Challenge, you agree to Xiting's Cookie and Privacy Policy.

Your name:
Your email:
How do you create an authorization object?
From which table(s) do you extract user email addresses?
Which of the following are org fields in an SAP ECC system? (select all that apply)
What is the authorization object which gives developer debugging authorization?
In which transaction can you check lock entries?
When programming an AUTHORITY-CHECK statement where you don’t yet know the value which is going to be checked for a field; which of the following are correct approaches? (select all that apply)
You need to create a program which only one user should be able to use. How do you ideally authorize it?

Alessandro Banzer

Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control and SAP Security.