R/3 USERS & ADMINISTRATION

1. What are the super users?
Ans. SAP* and DDIC

2.Users are client specific or client independent?
Ans. client specific

3.what is the table where user master record will be stored?
Ans.usr02

4.what is the t-code for creation of users?
Ans. SU01

5.what are the types of r/3 users?
Ans.
• Dialog user
• System user
• Communication user
• Service user
• Reference user
6. What is dialog user?
Ans. The user can logon to the system interactively for processing.

7. What is system user?
Ans. This is the user which is to communicate within the system. No logon is possible, used for ALE for exchanging of data.

8. What is communication user?
Ans. This is the user which is used to communicate between two r/3 systems. No logon is possible. Eg : CPIC user

9. What is service user?
Ans. A user with type service is a dialog user who is available to a large , anonymous group of users .

10. What is Reference user?
Ans. This is used to provide additional authorization who login to system through ITS.

11.what is the t-code for creation of user groups ?
Ans. SUGR ( for easy administration and maintenance)



12. what is the t-code for creating user own data?
Ans. SU3.

13. what is the t-code for creating of mass users with same
privileges ?
Ans. SU10

14. whether the Password for users can be SAP* or pass ( yes/no).

15. What is the parameter for validity period of passwords?
Ans. logon/password_expiration_time (in days).

16. What is the parameter for restricting multiple logons of the same user ?
Ans. login/disable_multi_gui_login

17. What is SAP* and DDIC?
Ans. SAP* -> posses all authorizations in r/3 system.
DDIC -> having full privileges for managing R/3 repository objects.

18. what is the process of triplet control?
Ans. it is to avoid misuse of authorizations and also no
authorization should be missed.

19. what are the various types of administrators ?
Ans.
• User administrator or system administrator
• Authorization administrator
• Profile administrator

20. what is SOX( SARBANES OXLEY PROCEDURE )?
Ans. A set of guidelines/rules which governs the assets , security of system for accountability and responsibility.

21. what is the process of authorization check?
Ans. First, the authorization for a transaction is checked.
Secondly, the authorization for an activity in the authorization object is checked.

what is authorization field?
Ans. The field on which authorization is set and requires authorization to access this element.

22. what is the t-code for creating authorization filed?
Ans. SU20



23. what is authorization object?
Ans. Group of not more than 10 relative authorization fields is called authorization object.

24. what is authorization class?
Ans. Group of relative authorization objects is called authorization class.

25. what is the t-codes for creating authorization object and authorization class?
Ans. SU21 for authorization object
SU22 for authorization class

26. What is activity ?
Ans. It specifies the type of action to be performed on authorization field.

27. What is the table for finding all activities ?
Ans. TACT.( in SM30)

28. what is the field value for activity?
Ans. ACTVT

29. what is profile?
Ans. Group of not more than 150 authorizations is called profiles.

30. what is composite profile ?
Ans. Group of two or more profiles is called composite profile.

31. what is Role?
Ans. it is a combination of profiles, URL’s, Menu’s, transactions, reports, user assignment is called Role.

32. what is composite Role?
Ans. Group of two or more Roles is called Composite Role.

33. what is Parent/generic Role?
Ans. parent role is a role where organization levels are maintained and it is used to derive child roles/derived role.

35.what is the t-code for creating user groups?
Ans. SUGR

36 what is the t-code for creating internet users?
Ans. SU05

37. what is the t-code for creating manual profiles?
Ans. SU02

38. what is the t-code for creating roles?
Ans. PFCG

39. what is the status of check indicators?
Ans.

U- check indicator unspecified
N- Authorization object is not checked under this transaction
C- Authorization object is checked under this transaction
CM- checked and maintained

40. What is a standard roles ?
Ans. The default roles that is provided by SAP.

41. What is the program for seeing Standard roles?
Ans. RSUSR070

42. What is the Three modes available for Role processing ?
Ans.
• Simple maintenance
• Basic maintenance
• Complete view

43. what are various states for roles?
Ans.
o Standard
o Changed
o Manually
o Maintained
o Old
o New

44. what is the tab added when you create composite role?
Ans. Role tab( instead of authorization tab in PFCG).

45. what is the background job program for User comparison?
Ans. PFCG_TIME_DEPENDENCY

46. what is the t-code for user master reconciliation?
Ans. PFUD


47. where we can transport roles within in the landscape?
Ans. PFCG -> Transport

48. Where we can find Missing Authorizations?
Ans. SU53 and also in ST01 (authorization check)

49. what is the t code for creating mass users having different privileges?
Ans. SCAT

50. what is the t code for seeing last changed documents?
Ans. SUIM

51 what is the t code for seeing user context?
Ans. SU56

52. what is the t code for configuring central user administrator ?
Ans. SCUA

53. what is the purpose of SCUA?
Ans. we can perform all user maintenance activities in one defined client ( parent client) on one system and then distribute the data to the other clients ( child clients) of the same system or other systems.

54. what is the t code for distributing parameters ?
Ans. SCUM

55. What is various options for maintaining parameters ?
Ans.
Global -> parameters maintained in central system and can
distribute to child systems.
Local -> parameters maintained in local system only

Retval -> the parameters can be maintained both in local and global systems. The changes made in child systems can be transferred to parent and distribute to all remaining child systems.

Proposal -> a field with this option is maintained and distributed with a default value when a user is created.
Everywhere -> the value can be maintained both centrally and locally.

56.What is the program for deleting CUA?
Ans. RSDELCUA

57. What is the t code for transferring of existing users of child system to CUA?
Ans. SCUG

58. What is the t-code for generating partner agreements?
Ans. BD82

59. What is the t-code for CUA logs?
Ans. SCUL

60. What is the t-code for creating distribution model view?
Ans. BD64

61. What is Security Audit log?
Ans. The security Audit log enables you to log all users activities that are relevant to security in the system.

62. What is the t code for assigning company address?
Ans. SUCOMP.

63. What is the t-code for Security audit configuration?
Ans. SM19

64. What is the t-code for Security audit analysis?
Ans. SM20

65. what is the parameter for restricting minimum length of password?
Ans. login/min_password_lng ( min is 3 char and max is 8 char)

66.What is the table to restricting the illegal passwords?
Ans:Usr40

No comments:

topics