SAP Security

12345678910
Across
  1. 3. Defined as one individual having the ability to perform overlapping and conflicting function.
  2. 4. In SAP BW, Tcode used to check AAs and also in tracing and analysis of authorization issues.
  3. 6. Tcode used in CRM for tracing Authorization Issue
  4. 7. This role inherits the menu structure and the functions included from a template role
  5. 8. Authorization control in SAP which governs table access
  6. 10. Consists of any number of single roles.
Down
  1. 1. IDM page that is accessed by end-users and approvers/managers
  2. 2. Tcode for Checking Table
  3. 3. Tcode for User Maintenance
  4. 5. Majority of cyber-attacks and security breaches happen at which layer?
  5. 6. A user of the type ______ is a dialog user that is available to an anonymous, larger group of users. Generally, this type of user should only be assigned very restricted authorizations.
  6. 9. Tcode for used for maintaining/creating/deleting roles in the SAP Environment