SAP Security Challenge – July 2018

by

SAP Security Challenge - July 2018

Complete our July Challenge and enter the draw to win a copy of the SAP System Security Guide. By completing the SAP Security Challenge, you agree to Xiting's Cookie and Privacy Policy.

Your name:
Your email:
What is the name of the newest SAP Security book that was co-authored by Xiting's Alessandro Banzer?
What is the name of the latest training course by SAP Education that talks about authorizations in S/4HANA?
What is the difference between S/4HANA and Suite on HANA?
Where do you find the information on what Fiori applications are available to replace a transaction in the backend?
If you run FIORI on an embedded environment, whereas you have the front end and back end running on the same instance, do you still have to authorize the gateway services?
What is the best-practice approach when building end-user roles for Fiori?
In which table can you find the hash values for your services/components that are required in the S_START authorization?
What are the least authorizations that a user needs to execute the Fiori launchpad? (select all that apply)
What's the purpose of generating the hash values of services?
Do all Fiori applications have an associated ODATA service?

Alessandro Banzer

Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control and SAP Security.

Latest posts by Alessandro Banzer (see all)