SAP Security Authorization Interview Questions

 SU25

  1. How will you initialize SAP Security in your organization?

  2. What are the steps involved in SU25?

  3. What is the purpose of SU25 in SAP Security?

  4. What is the relationship between USOBT, USOBX tables and USOBT_C, USOBX_C tables in SAP Security?

  5. Why should we initially fill the customer tables in SU25?


SU01

  1. What are the types of users in an SAP System?

  2. In which scenarios are these user types used? Provide examples for each.

  3. What is the use of the User Group field under the Logon Data tab?

  4. What is the difference between Logon Data User Group and the User Group in SU01?

  5. What is the purpose of the Parameters tab and Personalization tab?

  6. What is the validity period for end users?

  7. What are the Authorization checks for the user?

  8. How will you delete a user?

  9. How do you reset passwords for multiple users at once?

  10. How do you lock/unlock multiple users simultaneously in SAP Security?

  11. In which scenarios would you use a Reference User type?

  12. What is the purpose of the Defaults tab?

  13. Where can we add Reference User IDs?

  14. What is the maximum number of profiles that can be assigned to a user in SAP?

  15. What is the length of the User Buffer in an SAP System?

  16. What are the mandatory fields required to create a user in SAP?

  17. What is the difference between Communication and System type users in SAP?

  18. What is the use of the Licensing Data tab in SU01?

  19. How will you obtain a URF (User Request Form) in your organization?

  20. How can you change an existing User ID?


SU10, LSMW & SECATT Scripting

  1. How do you create 1,000 users at a time in an SAP system?

  2. Explain the LSMW process.

  3. What is the difference between SU10 and SU01?

  4. What is URF?

  5. When do you perform mass user creation in SAP?

  6. In which scenarios would you reset passwords for multiple users in SAP?

  7. Have you created mass users using SECATT? If yes, explain the process.

  8. While creating mass users in SECATT, what changes are required in the SAP system?

  9. What are the advantages of creating mass users using scripts instead of SU10?

  10. What are the advantages and disadvantages of SU10?

  11. How do you share a system-generated password with a user?


User-Related Tables (SE16 - USR Tables)*

  1. What is USR02?

  2. Where can you find the user lock status at the table level, and under which field?

  3. In which table can you find user license data at the table level?

  4. In which table can you find incorrect logon attempts for a user?

  5. In which table can you find the user buffer size?

  6. Where can you find the Alias name for a user at the table level?

  7. Where can you find user login sessions?

  8. What are MODDA, MODBE, and MODT fields, and in which table are these fields located?

  9. Where can you find the last missing authorizations for a user at the table level?

  10. Where can you find a user's email address?


PFCG (Profile Generator)

  1. Have you worked on the Profile Generator?

  2. Have you worked on role creation? How many roles have you created?

  3. How do you create roles in your organization? What naming convention do you follow?

  4. What is the purpose of derived roles?

  5. Can we add a composite role to another composite role? If not, why?

  6. How many profiles can be added to a single user?

  7. What is the difference between a profile and a role?

  8. Can we assign profiles directly to users? If yes, how many profiles can be assigned?

  9. What is an Authorization Object?

  10. Why should we generate a profile in PFCG?

  11. What types of roles does your organization follow?

  12. What is the relationship between PFCG and SU24?

  13. How do you make changes to derived roles?

  14. Have you worked in Expert Mode in PFCG?

  15. What are the types of statuses available in the Profile Generator?

  16. What do the traffic signal indicators in PFCG mean?

  17. Have you worked with the SU22 transaction code?

  18. What is the relationship between SU22 and PFCG?

  19. Have you created custom authorization objects?

  20. What are the system login parameters used by an administrator?

  21. How do you troubleshoot user access-related issues?

  22. How do you convert fields to Organizational Values?

  23. How do you delete a role?

  24. How do you transport a role from Development to Production systems?

  25. How do you delete roles from a Production system?

  26. Why do single roles sometimes have more than one profile?

  27. How do you delete all expired role assignments for multiple users?

  28. How do you assign a single role to multiple users?

  29. How do you delete multiple roles in SAP at once?

  30. How do you grant access to specific tables?

  31. How do you restrict access to reports?

  32. How do you extract a list of users who have not logged in for three months?

  33. What are the Authorization checks for a Dialogue User?

  34. How do you check whether a user is locked or unlocked in the SAP system?

  35. Can we assign generated profiles directly to users? What happens if we do?

  36. What happens internally when a user executes a transaction code in SAP?

  37. What is the difference between Short and Long Descriptions in the PFCG screen?

  38. What is the purpose of the Read Menus tab in PFCG?



Comments Comments