{"id":2952,"date":"2018-05-01T06:00:25","date_gmt":"2018-05-01T10:00:25","guid":{"rendered":"https:\/\/www.xiting.us\/?p=2952"},"modified":"2026-02-15T16:43:10","modified_gmt":"2026-02-15T15:43:10","slug":"sap-security-challenge-may-2018","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/","title":{"rendered":"SAP Security Challenge &#8211; May 2018"},"content":{"rendered":"<p>Welcome to the&nbsp;<a href=\"https:\/\/www.xiting.us\/blog\/sap-security-challenge\/\">SAP Security Challenge<\/a>&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#8217;t know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset.<\/p>\n<p>We will publish a new&nbsp;<span class=\"highlight\"><span class=\"colour\"><span class=\"font\"><span class=\"size\">quiz<\/span><\/span><\/span><\/span>&nbsp;every first of the month, consisting of ten (10) questions. Participants can submit their answers anytime between the first and last day of the month. The winner will be announced on the first day of the following month via newsletter and on our blog. Each participant enters the draw to win a ticket. One correct answer&nbsp;gives you one ticket in the draw (e.g. 8 correct answers gives you 8 tickets). The more you know, the higher the chances to win.<\/p>\n<h2>April Challenge<\/h2>\n<p>In April&#8217;s challenge, we had 192 participants and an overall average of 7.1 correct answers. In total, 7 participants&nbsp;were able to answer all questions correctly.<\/p>\n<h3>The Champion<\/h3>\n<p>We are very happy to announce that <strong>Matthew L.<\/strong>&nbsp;is the lucky winner of the SAP Security challenge&nbsp;of April 2018. Matthew answered 4 questions correctly and wins the $50 gift card from Amazon.<\/p>\n<h3>Answers from April&#8217;s Challenge<\/h3>\n<p><strong>Which of the following tables can help in determining the single roles which are assigned to a given composite role?<\/strong><br \/>\nWith table AGR_AGRS, you can find all assignments to a composite role.<\/p>\n<p><strong>Which transaction can be used to see all available authorization objects?<\/strong><br \/>\nYou can see all available authorization objects in transaction SU21. In transcation SU20, you can find all the authorization fields.<\/p>\n<p><strong>Will table AGR_TCODES show manually inserted values for authorization object S_TCODE?<\/strong><br \/>\nManually inserted values in object S_TCODE will not be shown in table AGR_TCODES. AGR_TCODES only shows objects that are inserted through the role menu and hence pull authorization proposals.<\/p>\n<p><strong>In PFCG, what does an authorization with a status of \u201cChanged\u201d mean?<\/strong><br \/>\nThe status &#8220;Changed&#8221; means that the authorization values proposed by SU24 have been changed in the authorization. This status must be avoided as it breaks with the authorization proposals from SU24.<\/p>\n<p><strong>What is the sequence of an authorization check for a transaction?<\/strong><br \/>\nWhen a user enters a transaction code, the first authorization checks are for S_TCODE and then TSTCA. If successful and the user is authorized to execute the transaction, further authorization checks in the program are being executed.<\/p>\n<p><strong>What is the purpose of transaction SE97?<\/strong><br \/>\nIn SE97, you can maintain the authorization check for another transaction that is executed via the CALL TRANSACTION statement. You can activate or deactivate an authorization check. It&#8217;s important to maintain the CALL TRANSACTIONS in SE97 to avoid unwanted behavior for called transactions.<\/p>\n<p><strong>In which transaction do you maintain variant transactions?<\/strong><br \/>\nIn transaction SHD0, you can create and maintain variant transaction. Variant transactions are especially helpful to remove unwanted buttons and options from standard transactions.<\/p>\n<p><strong>What authorization is required to debug ABAP code?<\/strong><br \/>\nWith S_DEVELOP and value DEBUG for field OBJTYPE you can debug ABAP code in the system. The activity 03 allows displaying the debugger. With activity 02, you can also manipulate the variables in the debugger and is hence considered highly critical.<\/p>\n<p><strong>Is it possible to deactivate the authorization check for object F_BKPF_BUK in a certain transaction, for example FK03?<\/strong><br \/>\nYes, you can deactivate the authorization check for objects that are not from basis or HR with the check indicator in SU24. If deactivated, the authorization check will be performed but will always pass regardless of the authorization of a user.<\/p>\n<p><strong>Which tables are behind transaction SU24?&nbsp;<\/strong><br \/>\nUSOBT_C and USOBX_C contain the data behind transaction SU24. The table USOBX_C contains the check indicators of the authorization objects, while table USOBT_C contains the authorization objects including the authorization fields and values.<\/p>\n<h2>May Challenge<\/h2>\n<p>[qsm quiz=7]<\/p>\n<p>We wish you the best of luck in the challenge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#8217;t know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset. We will publish [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9385,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1835],"tags":[145],"class_list":["post-2952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-securityquiz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Challenge &#8211; May 2018 - Xiting<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Challenge &#8211; May 2018\" \/>\n<meta property=\"og:description\" content=\"Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#039;t know? To help you identify\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-01T10:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-15T15:43:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"964\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Banzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Banzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/\"},\"author\":{\"name\":\"Alessandro Banzer\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\"},\"headline\":\"SAP Security Challenge &#8211; May 2018\",\"datePublished\":\"2018-05-01T10:00:25+00:00\",\"dateModified\":\"2026-02-15T15:43:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"keywords\":[\"securityquiz\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/\",\"name\":\"SAP Security Challenge &#8211; May 2018 - Xiting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"datePublished\":\"2018-05-01T10:00:25+00:00\",\"dateModified\":\"2026-02-15T15:43:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"width\":964,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-may-2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Challenge &#8211; May 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\",\"name\":\"Alessandro Banzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"caption\":\"Alessandro Banzer\"},\"description\":\"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Challenge &#8211; May 2018 - Xiting","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"SAP Security Challenge &#8211; May 2018","og_description":"Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don't know? To help you identify","og_url":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2018-05-01T10:00:25+00:00","article_modified_time":"2026-02-15T15:43:10+00:00","og_image":[{"width":964,"height":600,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","type":"image\/jpeg"}],"author":"Alessandro Banzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Banzer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/"},"author":{"name":"Alessandro Banzer","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e"},"headline":"SAP Security Challenge &#8211; May 2018","datePublished":"2018-05-01T10:00:25+00:00","dateModified":"2026-02-15T15:43:10+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/"},"wordCount":667,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","keywords":["securityquiz"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/","url":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/","name":"SAP Security Challenge &#8211; May 2018 - Xiting","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","datePublished":"2018-05-01T10:00:25+00:00","dateModified":"2026-02-15T15:43:10+00:00","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","width":964,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-may-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Challenge &#8211; May 2018"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e","name":"Alessandro Banzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","caption":"Alessandro Banzer"},"description":"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.","url":"https:\/\/xiting.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=2952"}],"version-history":[{"count":2,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2952\/revisions"}],"predecessor-version":[{"id":46937,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2952\/revisions\/46937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/9385"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=2952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=2952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=2952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}