{"id":867,"date":"2012-01-21T03:28:14","date_gmt":"2012-01-21T03:28:14","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=867"},"modified":"2013-09-22T03:53:08","modified_gmt":"2013-09-22T03:53:08","slug":"interview-questions-part-3","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/interview-questions-part-3\/","title":{"rendered":"Interview Questions &#8211; Part 3"},"content":{"rendered":"<h2 style=\"text-align: center;\"><strong><br \/>\n<\/strong><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\">SAP Security Interview Questions<\/span><br \/>\n<\/span><strong><!--more--><\/strong><\/h2>\n<h2 style=\"text-align: center;\"><strong><br \/>\n<\/strong><\/h2>\n<h3><span style=\"color: #0000ff;\">Q What is the difference between USOBX_C and USOBT_C?<\/span><strong><br \/>\n<\/strong><\/h3>\n<p><span style=\"color: #4c4c4c;\"><span style=\"font-family: verdana;\">USOBX_C and USOBT_C are tables which are used for <a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/su24-concept-in-sap\"><span style=\"color: #4c4c4c;\">SU24<\/span><\/a> transaction code.<br \/>\n<\/span><span style=\"font-family: verdana;\"><br \/>\nThe table USOBX_C defines the status of authorization checks for authorization objects, i.e. whether the &#8220;check indicator&#8221; is set to yes or no. It also defines the proposal status, i.e. whether the authorization check values are being maintained in SU24 or not.<\/span><\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nThe table USOBT_C defines the &#8220;values&#8221; which are maintained for check-maintained authorization objects.<\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. What does the different color light denote in profile generator?<\/span><\/h3>\n<p><strong><\/strong><!--more--> <span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">There are three colors (like traffic lights) in profile generator:<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\n<strong>Red<\/strong> &#8211; It means that some organizational value has not been maintained in org field in profile generator.<br \/>\n<strong>Yellow<\/strong> &#8211; It means that there are some or all fields in certain authorization instances which are blank (not maintained)<br \/>\n<strong>Green<\/strong> &#8211; It means that all the authorization fields are maintained (values are assigned).<\/span><\/span><\/p>\n<p><strong><!--more--><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. How can we convert Authorization Field to Org Field?<\/span><\/h3>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">The report <strong>PFCG_ORGFIELD_CREATE<\/strong> is used for converting an Authorization Field to Org Level Field. It can be executed using SA38\/SE38 tcode.<\/span><\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nThere is a bit of caution involved here. Make sure that whatever change related to this conversion is made is done in the initial stage of security role design\/system setup. In case this task is performed at a later stage, there is a risk that this will impact lots of existing roles. All those roles would require analysis and authorization data will have to be adjusted. <\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\"> <strong>NOTE<\/strong> : Authorization fields <strong>TCD (Tcode) and ACTVT (Activity)<\/strong> cannot be converted to org level fields.<\/span><br \/>\n<\/span><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. How do we find all activities in SAP?<\/span><\/h3>\n<p><strong><\/strong><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\">All Activities in SAP are stored in table <strong>TACT<\/strong>. All valid activities are stored in table <strong>TACTZ<\/strong>. The tables can be accessed via SE16 tcode.<\/span><\/p>\n<p><!--more--><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"text-decoration: underline;\"><em><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/interview-questions-part-4\" target=\"_blank\"><span style=\"color: #e63518; text-decoration: underline;\">Interview Questions Contd..<\/span><\/a><\/em><\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security Interview Questions<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/867"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=867"}],"version-history":[{"count":7,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/867\/revisions"}],"predecessor-version":[{"id":1771,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/867\/revisions\/1771"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}