FAQS

1. How a Consultant can access systems?

A: Consultant should have VPN using secure ID.

2. How a Consultant can get SAP User ID from ?

A: Project Manager should request with NRQ details of Consultant.

3. What is chat tool being used to communicate with Onsite/KO users?

A: Lotus notes same time. Important discussion should be saved for future reference.

4. What are the diff SAP components used at ?

A: SAP R/3 (FI/LO & HR), BW/SEM, APO, EBP & EP

5. What is the mail system being used to communicate with client?

A: Lotus Notes

6. What is the Incident Management tool used for all troubleshooting tickets/requests?

A: Vantive

7. What is DAG / GAG?

A: Derived Activity Group / Global Activity Group(Derived Role & Base role/Parent role)

8. What is the tool used for DAG/GAG documentation & change history?

A: Roles and Database Security (RSD)

9. What need to be taken as a reference before proceeding with Vantive?

A: An Approved BSSR form( Business System Service Request ).

10. What is DOA?

Delegation of Authority.
11. What is an AAM?

A: AAM stands for ‘All about me’. This is based on SAP EP 5.0 and used for ESS, MSS and other applications/BW query.

12. What is RSA Keon?

A: This is third party software being used by for Secure Network connection to SAP systems. It also enables single sign-on. There is Server component which maintains the user database and Security certificate etc. Users who use this has to have a desktop component to logon to RSA first before logging on to any SAP system (which he/she must use thru SNC).

13. What is SSRC?

A: SAP SECURITY RELEASE CUTOVER (4 Release per year) – thru this major security changes (GAG creation or modification) are taken care of.

14. How will user request for AAM?

A: User will request for this through Vantive tool.

15. What is SNC string?

A: SNC string should be updated in user master in SAP for all users who need to logon thru RSA Keon. The format is p:@. This should ideally be updated by RSD tool itself based on users access to ‘highly restricted’ or ‘restricted’ DAG. In case it is not updated, Security custodian should update using firecall id.

16. What is Firecall id?

A: A common id with power users rights used by Security custodians/few support managers to make some urgent changes to the system.
17. What is the role of Security Custodian?

A: Security custodians normally take care of DAG assignment of users in production systems. They also gather requirement from business people and submit requests to Security team.


18. What is SOD?

A: SOD stands of Segregation of Duties by which it is ensured that one does not have two or more conflicting (risky in terms of business) access/authorization. A classic example can be someone having access to both PO creation and PO approval.

19. What is our SLA?

A:

Priority
Description
Response Time
Resolution Time
0 Emergency: System shutdown or severe restrictions in the production system => business interruption in any critical function 95% within 15 minutes 95% within 3 hours
1 Urgent: Production system is up, but critical business processes are not working and no workaround is available 95% within 30 minutes 95% within 12 hours
2 High Priority (default): Production system is up, but non-critical business processes are not working or critical business processes are not working but workarounds are available 95% within 2 Business hours 95% within 4 working days
3 Medium-Low Priority: No disruption to business processes. Required information can be easily obtained through alternative methods Under investigation Under investigation

No comments:

topics