Showing posts with label INTERVIEW. Show all posts
Showing posts with label INTERVIEW. Show all posts

Tables required for SAP Security consultants

To work on daily issues S&A team need tables names related to  authorizations to fix the authorization issues.

BW Related Tables :

RSECHIE                        Status of Authorization Hierarchies
RSECHIEVIEW                    Hierarchy Authorizations Join for All ACT
RSECLOG                        Storage for Authorizations Logs xml
RSECLOG_CL                     Analysis Authorizations BI: Logging Active
RSECTXT                        Authorization Texts
RSECUSERAUTH                   BI AS Authorizations: Assignment of User Auth
RSECUSERAUTH_CL                BI AS Authorizations: Assignment of User Auth(change log)
RSECVAL                        Authorization Value Status
RSECVAL_CL                     Authorization Value Change (Change Log)
RSECVAL_CL_VIEW                View for Versioning
RSECVALVIEW                    Join of USERAUTH, RSECVAL and RSECBIAU: AlRSECVAL_CL                     Authorization Value Change (Change Log)
RSECVAL_CL_VIEW                View for Versioning
RSECVALVIEW                    Join of USERAUTH, RSECVAL and RSECBIAU: All ACT & A-Versions

ECC tables for all security consultant:

USR* Tables:


USR01 User master record (runtime data)
USR02 Logon Data (Kernel-Side Use)
USR03 User address data
USR04 User master authorizations
USR05 User Master Parameter ID
USR06 Additional Data per User
USR06SYS System-Specific User Classification (Licen
USR07 Object/values of last authorization check
USR08 Table for user menu entries
USR09 Entries for user menus (work areas)
USR10 User master authorization profiles
USR11 User Master Texts for Profiles (USR10)
USR12 User Master Authorization Values
USR13 Short Texts for Authorizations
USR14 Surchargeable Language Versions per User
USR15 External User Name (Replaced By Table USRA
USR16 Values for Variables for User Authorizatio
USR20 Date of last user master reorganization
USR21 Assign user name address key
USR40 Table for illegal passwords
USR41 User master: Additional data
USRVAR Variants for Critical Authorizations

 Email id for users:

ADR6 E-Mail Addresses (Business Address Service

 AGR* tables  related to Roles.


AGR_1251 Authorization data for the activity group
AGR_1252 Organizational elements for authorizations
AGR_USERS Assignment of roles to users
AGR_TCODES Assignment of roles to Tcodes
AGR_AGRS Roles in Composite Roles
AGR_DEFINE Role definition/Single and derived roles

Developer Key table:

DEVACCESS Table for development user/DEV keys

Transport Request :


E070                            Change & Transport System: Header of Requests/Tasks
E071                         System: Object Entries of Requests/Tasks

 















SAP CRM Security Interview Questions



+ CRM latest version.?

+ What is the  difference between ECC and CRM Security?

+ What are the advantages of CRM latest version.?    
                                                                                        
+  What is Business Roles in SAP CRM.?

+ What is the T-code to Launch Web-UI.?

+ What is the T-code  to create Business Roles in SAP.?

+ How to assign Business Roles to users in SAP crm.?

+ Explain 2 real time scenario's in you have faced.?

+ What is Business Partner in CRM.?

+ What are the main Authorization Objects in SAP CRM.?


R3 Security Interview Questions

Technical Questions

+What is your role design?
+How many users or roles till have u created?
+What is your ticketing tool?tell something about it?
+What we have to check "modifiable" in transport request?what is its importance?

SAP security general questions


These interview questions are collected from my friends and some of faced by me. I know some of you already aware of these questions though will help for beginners  as well as experinced.I am sure these will help.

Questions about out of subject (general):

+which kind of projects you worked?

+what is server id?


+what is EHP?(enhancement package)?


+What is ECC & ERP?


+What is the difference between ERP & R3?


+How many roles and user your organization have?


+what are your system names?  


BW/BI Security Interview Questions


  These are top ten interview questions .............

Prepare these enough, you can perform well in interview. Actually  BI/BW Security syllabus is a small than u think.

 

1.       What is your experience in BI Security?

 

2.       What do you mean by Analysis authorizations? 

 

3.       What is the difference between analysis authorizations and authorizations in R/3 Security?