✅ 1. SAP Security Basics
- SAP Security = User Access + Authorization Control.
- Ensures:
✔ Controlled system access
✔ SOD compliance
✔ Role-based access
✔ Audit & governance
Core tools: SU01, SU10, SU24, SU22, PFCG, SU53, ST01.
✅ 2. User Administration
- Create/Lock/Delete users (SU01)
- Mass user changes (SU10)
- User groups & roles
- Password reset policies
- User types:
- Dialog
- System
- Communication
- Service
- Reference
✅ 3. Role Administration (PFCG)
- Role = Menu + Authorizations + User assignment.
- Types of roles:
- Single role
- Composite role
- Derived role (child role)
- Menu tabs:
- Transaction codes
- Reports
- Web links
- Authorization objects
Role maintenance steps:
- Add menu items
- Pull SU24 defaults
- Generate profile
- Assign users
✅ 4. Authorization Objects
- Consist of fields
- Authorization checked by ABAP code
- Key fields: ACTVT (activities), P_ORGIN, P_GROUP, F_BKPF_BUK, S_TCODE
- ACTVT values:
- 01 → Create
- 02 → Change
- 03 → Display
- 06 → Delete
- 08 → Execute
- 16 → Print
✅ 5. Key Security Transactions
- SU01 – User maintenance
- PFCG – Role maintenance
- SU24 – Check indicators
- SU53 – Missing authorization analysis
- ST01 – Trace
- SU22 – Maintain object defaults
- SE93 – T-code assignment
- SU10 – Mass maintenance
✅ 6. SOD (Segregation of Duties)
- Ensures two conflicting activities are not given to one user.
- Managed via:
- GRC Access Control
- Rule sets
- Risk IDs
- Mitigating controls
- Common SOD conflicts:
- Create vendor + Pay vendor
- Create purchase order + Approve PO
- Create FI document + Post payment
✅ 7. SAP GRC (Governance, Risk, Compliance)
Core modules:
- ARA – Access Risk Analysis
- ARM – Access Request Management
- BRM – Business Role Management
- EAM – Firefighter Access
Important concepts:
- Risk analysis (user/role level)
- Mitigation
- Workflow approvals
- Firefighter logs
- Emergency access ID
✅ 8. SU24 / SU22 – Most Common Interview Topic
- SU24 maintains default authorization objects for a tCode.
- When added in PFCG, SU24 defaults populate:
✔ Checked objects
✔ Values - SU22 is SAP-delivered defaults (not editable).
Common Use: Fixing Authorization Sync issues.
✅ 9. Tracing Tools
- SU53 – Shows missing object of the last failed check.
- ST01 – Full authorization trace (SQL, RFC, Kernel checks).
- SUIM – Reporting
- Users by role
- Roles by object
- Object by fields
✅ 10. SAP Security Tables
- USR02 – Passwords & user login data
- AGR_USERS – User to role assignment
- AGR_1251 – Authorization object values in roles
- AGR_1016 – Menu entries
- AGR_DEFINE – Role definition
- USOBT_C / USOBX_C – SU24 custom tables
✅ 11. SAP Fiori & SAP Cloud Security (HOT TOPIC)
- Fiori access depends on:
- Catalog
- Group
- Role
- OData service authorization
- Authorization objects for Fiori:
/UI2/FLP/UI2/PAGE/IWBEP/*(Gateway)S_SERVICE
- Must activate services in /IWFND/MAINT_SERVICE
✅ 12. Structural Authorizations (HCM)
- Used in HR Security
- Object: P_ORGIN, P_ORGINCON, P_PERNR
- Define access by:
✔ Personnel Area
✔ Employee Group
✔ Organizational Unit - Maintained via OOAC, OOSP
✅ 13. SAP RFC Security
- Secure RFC connections:
✔ Strong passwords
✔ SNC encryption
✔ Trusted RFC setups
✔ Restrict RFC users - Use transaction: SM59
- Avoid wide-open S_RFC authorizations.
✅ 14. Audit & Logging
- Login logs (SM19/SM20)
- Change logs (SCU3)
- Table logging
- Secure profile parameters:
login/min_password_lnglogin/fails_to_user_locklogin/password_expiration_timeauth/number_in_userbuffer
✅ 15. SAP Security Best Practices
- Follow Principle of Least Privilege
- Use derived roles for plants/countries
- Avoid manual object changes—use SU24
- Avoid using SAP_ALL, SAP_NEW
- Review access logs monthly
- Maintain emergency access procedures
🔥 Most Asked Scenario-Based Questions (Be Ready!)
1️⃣ “User is facing authorization error — how do you troubleshoot?”
Steps:
- Run SU53
- Run ST01 trace
- Identify missing objects
- Adjust PFCG role
- Regenerate profile
2️⃣ “Difference between composite role vs derived role?”
- Composite Role = Group of single roles.
- Derived Role = Child role that inherits menu from parent, but has different org values.
3️⃣ “How do you secure Fiori apps?”
- Provide Catalog + Group
- Assign PFCG role
- Assign OData service authorization
- Provide S_SERVICE access
- Check /IWFND/CHECK_SRV
4️⃣ “User needs display-only access — how do you restrict?”
- Restrict ACTVT field to 03
- Remove modify/change activities (01, 02, 06)
5️⃣ “How do you identify SOD conflicts for users?”
Using GRC → ARA → SOD Matrix → Risk ID → Generate report.
6️⃣ “Difference between SU53 and ST01?”
- SU53: Last failed check only
- ST01: Complete trace (more accurate)
7️⃣ “User assigned role but tCode still not accessible?”
Possible issues:
- Authorization object values missing
- SU24 defaults wrong
- Role not generated
- Validity dates incorrect
- Buffer not refreshed (/nSU56)
8️⃣ “How do you manage HR structural authorizations?”
- Create structural profile
- Assign via OOSP
- Maintain evaluation paths
- Test via P_ORGIN/P_ORGINCON
I share content relevant to Tech/Interview/Corporate/ & Anything Stuff !!
Do follow for more useful content : https://www.linkedin.com/in/vartika-gupta24/