ATOS Interview Questions: 1. What T-Code Is Used For Creating User Groups?
ATOS Interview Questions: 1. What T-Code Is Used For Creating User Groups?
ATOS Interview Questions: 1. What T-Code Is Used For Creating User Groups?
Give a name starts with Z & Infoset should be there & click CREATE & below is the next screen.
Give a User Group name & click SAVE or tick mark. Below screen will come.
On the above screen click LOCAL OBJECT & on the bottom left-hand corner you will see the message User Group saved.
Now in the screen of SQ03, press Assign Users and Infosets & the below screen comes.
Above is the next screen & in the blank fields just enter the USER names to handle the QUERY as given above & click ASSIGN INFOSETS to see the below screen.
Scroll down to Your Infoset then put a check mark & click save. A message appears User Group saved.
2. What are the critical Authorization objects you have worked with?
Ans: S_TCODE, S_TABU_DIS, S_TABU_LIN, S_TABU_LIN, S_PROGRAM, S_DEVELOP
It is used to maintain all the OBJECTS that are CHECEKED for a execution of a transaction. The check indicators are maintained in SU24 and are stored into two CUSTOMER specific tables USOBX_C and USOBT_C The customer specific tables ensure that the values modified by the customer will not over write by the SAP proposed values during a future upgrade.
SU24 - Initial Screen Each object can have three different status as given in the screenshot below
SU24 - check indicators Do not check These objects are not checked during transaction execution. Authorization objects belong to Basis and HR components can not be marked as Do not checked. Check , Yes (Check/Maintain in previous releases) These objects are checked during transaction execution and also pulled into a role when the transaction is added to a role. We also have an option of maintaining default values of the authorization fields for these objects. For example, in the last post regarding role maintenance, we saw a number of authorizations which were pulled into the role with default values. These authorizations appear with status standard or maintained in role maintenance. Check, No (Check in previous releases) These objects are checked during transaction execution but are not pulled into the role even if the transaction is added to the menu.
Its important to note that the primary check for an authorization object during program execution happens at the code level. So adding a check in Su24 will have no impact to security unless the code is modified as well to include a check for the authorization object.
6. What is the report used for finding the passwords of Standard Users?
Ans: Use the report RSUSR003 to make sure that the user SAP* has been created in all clients and that the standard passwords have been changed for SAP*, DDIC (and also the older user SAPCPIC). SAPCPIC SAPCPIC is created as a communication user at the installation and is mostly used for EDI. The standard profile S_A.CPIC restricts the access to the use of RFC. This user is hard-coded into the
function module INIT_START_OF_EXTERNAL_PROGRAM together with a standard password. This needs to be considered in case of password changes for this user. The standard password for this user directly after the installation is ADMIN.
1. Adjust the time zone setting to be consistent with the location of the user running the background job. 2. Create a non SLD connection on the SPM Frontend. 3. Switch RFC account to a dialogue user 4. Confirm authorization object GRCFF_0001 exists for the RFC account.
9. What is Mitigation?
Ans: Whenever a User/Role has a SOD voilation/Risk and it is not possible to remove any authorization
form the user in such case Mitigation come up. Its a process where you accept the risk but lower its severity by assiginig monitoring on the User/Role having risk. Mitigation Control performs the following functions: - Identifies the Segregation of Duties (SoD) as a known Risk. - Establishes a period of time during which the Risk may exist (is monitored). - Associates a list of Monitors with the Control. Only Monitors associated with a Control definition may be selected when mitigating a Risk. Mitigation Controls can be assigned to Users, Roles, Profiles, or HR Objects to mitigate a Risk. Mitigation is a temporary 'after the event' control which the business process owner and (usually) internal audit have agreed is required as the SoD or critical permissions cannot practicably be cleared by changing accesses. Single roles should never need to be mitigated, composite roles may need to be if providing a user with all of their SAP transactions/permissions, the user and the composite will have the same access and, therefore, the same risks. The mitigation should never be considered as a permanent replacement to remediation which is why there is a time limit for each one. Before going to mitigation, review the supplied rule-set to ensure the objects and values are fully understood and correct, e.g. having FBL5N without FB02 access doesn't constitute a real risk with other transactions as it is only a view access but can be flagged as a major problem. Think about the issues rather than relying on a SAP delivered rule-set.
10. What are the different BG jobs in RAR? What is the purpose of each job?
ANS:
1. 2. 3. 4.
On the RAR screen, choose the Configuration tab. While in the Configuration tab, choose Background Job Schedule Job. In the User/Role/Profile Synchronization section , select Incremental for the Sync mode field
In the User/Role/Profile Synchronization section, select User Synchronization, Role Synchronization, and Profile Synchronization checkboxes. 5. Accept wildcard (*) values for each corresponding system.
7. On the Management Report section, select Management Reports. 8. Choose the Schedule button. 9. On the Schedule Risk Analysis screen, enter the following.
Fields Job Name Immediate Start Values Enter appropriate name for Job (for example, RAR_Background_Job_01) Select the radio button
10. Choose the Schedule button. 11. If successful, the following message displays Background job scheduled successfully, Job ID: XX.
Result To view the status of your background job:
1. Choose the Configuration tab. 2. Choose Background Job Search. 3. Enter the job # in the Job ID field and choose Search.
4. Check the status of your background job.
Features
You can use the following functions to select and display SPL screening logs for the partners and documents that have been screened: Audit Trail - Business Partner Audit Trail - Document Audit Trail for External Addresses You can separate these transactions by selecting either the business partners or the documents you want to archive in the selection screen. In addition, since SAP GRC GTS writes all changes to business partners and documents to the audit trail, you can archive data depending on the status of business partners or documents that may have been blocked by SPL checks and were released then manually, for example.
Activities
To start the audit trail features, go to the area menu for SAP GRC GTS and choose SAP Compliance Management Sanctioned Party List Screening . Then choose the desired tab page and click Audit Trail Display Audit Trail for Business Partners Display Audit Trail for Documents Display Audit Trail for External Addresses
In the screen that follows, you can enter restrictions for the data you want to display. For example, you can enter one particular legal regulation. You can also specify whether you want to select and display data that has already been archived, such as SPL master data, SPL audit trail, and SPL master data change documents. To do so, choose Also Select Archived Data. When you choose Execute, the system displays a results list of all the partners and documents the system checked against a particular legal regulation that you entered in the selection screen. You can display the following details for each entry in the results list: Business partner's address data Document data SPL data User data
Comments (if any) These functions allow you and the authorities to monitor the reasons for a user deciding to override a system decision to block a particular document or business partner. The users comments are also contained in the audit trail, which makes all your business processes transparent.
S_RS_COMP1 This authorization object restricts queries to specific owners. This can be used to restrict which queries can be reviewed by a query owner based on the correct application area. S_RS_FOLD This authorization object can restrict users display access to a specific folder. This will prevent BI users to get access to other infoareas.