SAP Security Challenge – June 2018

by

SAP Security Challenge - June 2018

Complete our June Challenge and enter the draw to win a $50 Amazon gift card. By completing the SAP Security Challenge, you agree to Xiting's Cookie and Privacy Policy.

Your name:
Your email:
Which transaction allows you to display the User Buffer for your own user as well as for other users?
Which SAP standard report can be used to analyze users and roles for segregation of duty conflicts as well as for critical authorizations?
When users are locked they have a lock status. The lock status can be seen in table USR02 and field UFLAG. Which lock status are possible? (select all that apply)
How many authorization fields can an authorization object have?
In which transaction can you check the table logs?
How to smoothly remove duplicate role assignments with different start and end date from a user?
In which tables (and views) does the SAP system store the password hashes of a user? (select all that apply)
In which table can you maintain illegal passwords that cannot be used by your users?
For RFC Redesigns, which tool SAP recommends to risk-free reauthorize your RFC users with SAP Note 1682316?
In SAP NetWeaver 7.50, which transaction can be used to locally lock a transaction for a certain client only?

Alessandro Banzer

Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control and SAP Security.

Latest posts by Alessandro Banzer (see all)