SAP Security Challenge

Try and beat me in the monthly SAP Security Challenge and enter a draw to win exciting prizes. Keep up with our latest blog posts and learn more about SAP Security.

What is the challenge about?

How much do you know about SAP Security? Do you know what you don't know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset.

How does the challenge work?

We will publish a new quiz every first of the month, consisting of seven (7) questions. Participants can submit their answers anytime between the first and last day of the month and enter the draw to win the monthly prize. The winner will be announced on the first day of the following month via newsletter and on our blog.

SAP Security Challenge - January 2019

Complete our January Challenge and enter the draw to win a copy of the SAP System Security Guide. By completing the SAP Security Challenge, you agree to Xiting's Cookie and Privacy Policy.

Your name:
Your email:
How do you create an authorization object?
From which table(s) do you extract user email addresses?
Which of the following are org fields in an SAP ECC system? (select all that apply)
What is the authorization object which gives developer debugging authorization?
In which transaction can you check lock entries?
When programming an AUTHORITY-CHECK statement where you don’t yet know the value which is going to be checked for a field; which of the following are correct approaches? (select all that apply)
You need to create a program which only one user should be able to use. How do you ideally authorize it?

Previous Challenges