{"id":1480,"date":"2012-10-20T09:38:14","date_gmt":"2012-10-20T09:38:14","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1480"},"modified":"2012-10-20T09:38:14","modified_gmt":"2012-10-20T09:38:14","slug":"interview-questions-part-6","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/interview-questions-part-6\/","title":{"rendered":"Interview Questions Part &#8211; 6"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h2><span style=\"text-decoration: underline; color: #0000ff;\">SAP Security Interview Questions<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #0000ff;\">Q. How many profiles can be assigned to any user master record?\u00a0<\/span><\/h3>\n<p><!--more--> <span style=\"color: #4c4c4c;\">Maximum number of profiles that can be assigned to any user master record is 312. Table USR04 contains the profiles assigned to users.\u00a0The field PROFS in USR04 table is used for saving the change flag and the name of the profiles assigned to the user. The change flags are &#8211; <strong>C<\/strong> which means &#8220;User was created&#8221; and <strong>M<\/strong> which means &#8220;User was changed&#8221;. The field PROFS is defined with a length of 3750 characters. Since the first two characters are intended for the change flag, 3748 characters remain for the list of the profile names per user. Because of the maximum length of 12 characters per profile name, this results in a maximum number of 312 profiles per user.\u00a0<\/span> \u00a0 \u00a0 <!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #0000ff;\">Q. Can a composite role be assigned to another composite role?\u00a0<\/span><\/h3>\n<p><!--more--> <span style=\"color: #4c4c4c;\">No. A composite role cannot be assigned to another composite role. Single roles are assigned to composite roles.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\">Q.\u00a0<strong>What does the PFCG_TIME_DEPENDENCY clean up?<\/strong><\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">The &#8216;PFCG_TIME_DEPENDENCY&#8217; background report cleans up the profiles (that is, it does not clean up the roles in the system). Alternatively, transaction code &#8216;PFUD&#8217; may also be used for this purpose.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #0000ff;\">Q. How to prevent custom objects from getting added to SAP_ALL profile?\u00a0<\/span><\/h3>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">Go to table PRGN_CUST and set the following parameter:\u00a0ADD_ALL_CUST_OBJECTS with value N.\u00a0<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\">Regenerate the SAP_ALL profile with report <span style=\"color: #0000ff;\"><strong>RSUSR406<\/strong><\/span> to have the customer object to be removed from SAP_ALL.\u00a0<\/span>See\u00a0SAP Note 410424 for more info.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #0000ff;\">Q. How to find out all actvt in sap?\u00a0<\/span><\/h3>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">All possible activities (ACTVT) are stored in table <span style=\"color: #0000ff;\"><strong>TACT<\/strong><\/span>\u00a0, and the valid activities for each authorization object can be found in table <span style=\"color: #0000ff;\"><strong>TACTZ<\/strong><\/span>.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #0000ff;\">Q. How to remove duplicate roles with different start and end date from user master?\u00a0<\/span><\/h3>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">Duplicate roles assigned to a user can be removed using PRGN_COMPRESS_TIMES.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; SAP Security Interview Questions &nbsp; &nbsp; &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1480"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1480"}],"version-history":[{"count":14,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1480\/revisions"}],"predecessor-version":[{"id":1496,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1480\/revisions\/1496"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}