{"id":873,"date":"2012-01-23T03:13:25","date_gmt":"2012-01-23T03:13:25","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=873"},"modified":"2012-09-20T20:52:10","modified_gmt":"2012-09-20T20:52:10","slug":"interview-questions-part-4","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/interview-questions-part-4\/","title":{"rendered":"Interview Questions &#8211; Part 4"},"content":{"rendered":"<h2 style=\"text-align: center;\"><\/h2>\n<h2 style=\"text-align: center;\"><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\"><span style=\"text-decoration: underline;\">SAP<\/span><span style=\"text-decoration: underline;\"> Securi<\/span><span style=\"text-decoration: underline;\">ty<\/span><span style=\"text-decoration: underline;\"> Interview Questions<\/span><\/span><\/h2>\n<h2 style=\"text-align: center;\"><span style=\"color: #0000ff;\"><strong><span style=\"text-decoration: underline;\"><br \/>\n<\/span><\/strong><\/span><\/h2>\n<p><strong><!--more--><\/strong><\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\"> Q. What important authorization objects are required to create and maintain user master records?<\/span><strong><br \/>\n<\/strong> <span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/h3>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">Following are some important authorization objects which are required to create and maintain user master records:<\/span><br \/>\n<span style=\"color: #4c4c4c;\"> \u2022 <strong>S_USER_GRP<\/strong>: User Master Maintenance: Assign user groups<\/span><br \/>\n<span style=\"color: #4c4c4c;\"> \u2022 <strong>S_USER_PRO<\/strong>: User Master Maintenance: Assign authorization profile<\/span><br \/>\n<span style=\"color: #4c4c4c;\"> \u2022 <strong>S_USER_AUT<\/strong>: User Master Maintenance: Create and maintain authorizations<\/span><br \/>\n<\/span><!--more--><\/p>\n<h3><\/h3>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. Which table is used to store illegal passwords?<strong><br \/>\n<\/strong><\/span><!--more--><\/h3>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">Table <strong>USR40<\/strong> is used to store illegal passwords. It can be used to store patterns of words which cannot be used as passwords.<\/span><br \/>\n<\/span><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. Explain the concept of &#8220;Status Text for Authorizations&#8221; &#8211; Standard, Changed, Maintained and Manual.<\/span><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/h3>\n<ul>\n<li><strong style=\"font-family: verdana;\"><span style=\"color: #4c4c4c;\">Standard<\/span> &#8211; <\/strong><span style=\"color: #4c4c4c;\"><span style=\"font-family: verdana;\">It means that all values in authorization field of an authorization instance is unchanged from the SAP default value (i.e. the values which are getting pulled from SU24)<\/span><\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"><strong><span style=\"font-family: verdana;\"> Maintained &#8211; <\/span><\/strong>It means that at least one of the field values in an authorization instance was blank when it was pulled from SU24 (i.e. SAP default value) and that blank field has been updated with some value. Other fields already having some value have not been touched.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> <strong>Changed &#8211; <\/strong>It means that the proposed value in at least one of the fields in an authorization instance has been changed.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> <strong>Manual &#8211; <\/strong>It means that at least one authorization field has been manually added, i.e. it was not proposed by profile generator.<\/span><\/li>\n<\/ul>\n<h3><\/h3>\n<h3><strong><!--more--><\/strong><\/h3>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. What is the difference between Role and Profile?<\/span><strong><br \/>\n<\/strong><!--more--><\/h3>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">A Role is like a container which contains authorization objects, transaction codes etc. A profile contains authorizations. When a role is generated using PFCG, a profile is generated which contains authorizations (instances of authorization objects).<\/span><br \/>\n<\/span><!--more--><\/p>\n<h3><\/h3>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. What is PFCG_TIME_DEPENDENCY ?<\/span><strong><!--more--><\/strong><\/h3>\n<p><span style=\"color: #4c4c4c;\"><strong>PFCG_TIME_DEPENDENCY<\/strong>\u00a0<span style=\"font-family: verdana;\">is<\/span><\/span><span style=\"color: #4c4c4c;\"> a<span style=\"font-family: verdana;\"> r<\/span><span style=\"font-family: verdana;\">e<\/span><span style=\"font-family: verdana;\">port which is used for user master\u00a0comparison. It should be a practice to do user master comparison after every role change and profile generation so that the user&#8217;s master record gets updated with the correct authorization. This report also cleans up the expired profiles from user-master record. Role name still remains in the SU01 tab of the user. Transaction code <strong>PFUD<\/strong> can also be used to directly execute this report.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/interview-questions-part-5\" target=\"_blank\"><span style=\"text-decoration: underline;\"><em><span style=\"color: #e63518; text-decoration: underline;\">SAP Security Questions -Part 5 contd..<\/span><\/em><\/span><\/a><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security Interview Questions<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/873"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=873"}],"version-history":[{"count":16,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/873\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/873\/revisions\/1324"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}