{"id":896,"date":"2012-02-05T10:47:08","date_gmt":"2012-02-05T10:47:08","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=896"},"modified":"2013-11-09T03:13:04","modified_gmt":"2013-11-09T03:13:04","slug":"interview-questions-part-5","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/interview-questions-part-5\/","title":{"rendered":"Interview Questions &#8211; Part 5"},"content":{"rendered":"<h2 style=\"text-align: center;\"><strong><br \/>\n<\/strong><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\">SAP Security Interview Questions<\/span><br \/>\n<\/span><\/h2>\n<p><strong><!--more--><\/strong><\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. What are the different tabs in PFCG?<\/span><br \/>\n<span><!--more--><\/span><\/h3>\n<p><span><span style=\"color: #4c4c4c; font-family: verdana;\">Following are some of the important tabs in PFCG:<\/span><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c;\"><strong>Description<\/strong>\u00a0&#8211; We define the role name and role text. We also have a text description option at the bottom where we can provide other details related to the role. Those details can be the ticket no through which the role was created, the various changes (addition\/removal of tcodes, authorization objects etc) and the date when those changes took place and the user who performed that task etc. It is a good practice to make use of this space as it helps in identifying the reasons for changes.<\/span><\/li>\n<li><span style=\"color: #4c4c4c;\"><strong>Menu<\/strong>\u00a0&#8211; For designing user menus like for addition of tcodes etc.<\/span><\/li>\n<li><span style=\"color: #4c4c4c;\"><strong>Authorizations <\/strong>&#8211;<\/span><span style=\"color: #4c4c4c;\"> For\u00a0maintenance\u00a0of Authorization data. Also for generating authorization profile.<\/span><\/li>\n<li><span style=\"color: #4c4c4c;\"><strong>User<\/strong> &#8211; For assigning users to role and for adjusting user master Records.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><!--more--><\/strong><\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q What does user compare do?<\/span><br \/>\n<span><!--more--><\/span><\/h3>\n<p><span><span style=\"color: #4c4c4c;\"><span style=\"font-family: verdana;\">When a role is used for generating authorization profile, then the user master record needs to be compared so that the generated authorization profile can be entered in the user master record. This\u00a0comparison\u00a0is done using tcode <\/span><strong><span style=\"font-family: verdana;\">PFUD <\/span><\/strong>or by scheduling the report <strong>PFCG_TIME_DEPENDENCY.<\/strong><\/span><br \/>\n<\/span><\/p>\n<p><!--more--><\/p>\n<h3><\/h3>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. What is user buffer?<\/span><\/h3>\n<p><!--more--> <span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\"><span style=\"font-family: verdana;\">A user buffer contains all authorizations of a user. Each user has his own user buffer and it can be displayed by executing tcode<\/span><strong><span style=\"font-family: verdana;\">\u00a0SU56<\/span><\/strong>. The authorization check fails when the user does not have necessary authorization in his user buffer or if the user buffer contains too many entries and has overflowed. The number of entries in user buffer is controlled using profile parameter\u00a0&#8220;<strong>Auth\/auth_number_in_userbuffer<\/strong>&#8220;.<\/span><br \/>\n<\/span><br \/>\n<strong><!--more--><\/strong><\/p>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. How many transaction codes can be assigned to a role?<\/span><\/h3>\n<p><strong><!--more--> <\/strong> <span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">A maximum of around 14000 transaction codes can be assigned to a role.<\/span><br \/>\n<\/span><!--more--><\/p>\n<h3><\/h3>\n<h3><strong><br \/>\n<\/strong><span style=\"color: #0000ff;\">Q. How many authorizations fit into a profile?<\/span><\/h3>\n<p><strong><!--more--> <\/strong> <span style=\"color: #4c4c4c; font-family: verdana;\">A maximum of 150 authorizations fit into a profile. If the number of authorizations exceeds this value, the profile generator automatically creates one more profile for the role.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/roles\" target=\"_blank\"><span style=\"text-decoration: underline; color: #e63518;\"><em>You may want to read more about Roles<\/em><\/span><\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security Interview Questions<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/896"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=896"}],"version-history":[{"count":10,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/896\/revisions"}],"predecessor-version":[{"id":1785,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/896\/revisions\/1785"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}