A: Consultant should have VPN using secure ID.
2. How a Consultant can get SAP User ID from ?
A: Project Manager should request with NRQ details of Consultant.
3. What is chat tool being used to communicate with Onsite/KO users?
A: Lotus notes same time. Important discussion should be saved for future reference.
4. What are the diff SAP components used at ?
A: SAP R/3 (FI/LO & HR), BW/SEM, APO, EBP & EP
5. What is the mail system being used to communicate with client?
A: Lotus Notes
6. What is the Incident Management tool used for all troubleshooting tickets/requests?
A: Vantive
7. What is DAG / GAG?
A: Derived Activity Group / Global Activity Group(Derived Role & Base role/Parent role)
8. What is the tool used for DAG/GAG documentation & change history?
A: Roles and Database Security (RSD)
9. What need to be taken as a reference before proceeding with Vantive?
A: An Approved BSSR form( Business System Service Request ).
10. What is DOA?
Delegation of Authority.
11. What is an AAM?
A: AAM stands for ‘All about me’. This is based on SAP EP 5.0 and used for ESS, MSS and other applications/BW query.
12. What is RSA Keon?
A: This is third party software being used by for Secure Network connection to SAP systems. It also enables single sign-on. There is Server component which maintains the user database and Security certificate etc. Users who use this has to have a desktop component to logon to RSA first before logging on to any SAP system (which he/she must use thru SNC).
13. What is SSRC?
A: SAP SECURITY RELEASE CUTOVER (4 Release per year) – thru this major security changes (GAG creation or modification) are taken care of.
14. How will user request for AAM?
A: User will request for this through Vantive tool.
15. What is SNC string?
A: SNC string should be updated in user master in SAP for all users who need to logon thru RSA Keon. The format is p:
16. What is Firecall id?
A: A common id with power users rights used by Security custodians/few support managers to make some urgent changes to the system.
17. What is the role of Security Custodian?
A: Security custodians normally take care of DAG assignment of users in production systems. They also gather requirement from business people and submit requests to Security team.
18. What is SOD?
A: SOD stands of Segregation of Duties by which it is ensured that one does not have two or more conflicting (risky in terms of business) access/authorization. A classic example can be someone having access to both PO creation and PO approval.
19. What is our SLA?
A:
Priority
Description
Response Time
Resolution Time
0 Emergency: System shutdown or severe restrictions in the production system => business interruption in any critical function 95% within 15 minutes 95% within 3 hours
1 Urgent: Production system is up, but critical business processes are not working and no workaround is available 95% within 30 minutes 95% within 12 hours
2 High Priority (default): Production system is up, but non-critical business processes are not working or critical business processes are not working but workarounds are available 95% within 2 Business hours 95% within 4 working days
3 Medium-Low Priority: No disruption to business processes. Required information can be easily obtained through alternative methods Under investigation Under investigation
No comments:
Post a Comment