{"id":3086,"date":"2018-06-01T06:00:41","date_gmt":"2018-06-01T10:00:41","guid":{"rendered":"https:\/\/www.xiting.us\/?p=3086"},"modified":"2026-02-15T16:42:56","modified_gmt":"2026-02-15T15:42:56","slug":"sap-security-challenge-june-2018","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/","title":{"rendered":"SAP Security Challenge &#8211; June 2018"},"content":{"rendered":"<p>Welcome to the&nbsp;<a href=\"https:\/\/www.xiting.us\/blog\/sap-security-challenge\/\">SAP Security Challenge<\/a>&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#8217;t know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset.<\/p>\n<p>We will publish a new&nbsp;<span class=\"highlight\"><span class=\"colour\"><span class=\"font\"><span class=\"size\">quiz<\/span><\/span><\/span><\/span>&nbsp;every first of the month, consisting of ten (10) questions. Participants can submit their answers anytime between the first and last day of the month. The winner will be announced on the first day of the following month via newsletter and on our blog. Each participant enters the draw to win a ticket. One correct answer&nbsp;gives you one ticket in the draw (e.g. 8 correct answers gives you 8 tickets). The more you know, the higher the chances to win.<\/p>\n<h2>May Challenge<\/h2>\n<p>In May&#8217;s challenge, we had 212 participants and an overall average of 6.7 correct answers. In total, 15 participants&nbsp;were able to answer all questions correctly.<\/p>\n<h3>The Champion<\/h3>\n<p>We are very happy to announce that <strong>James J.<\/strong>&nbsp;is the lucky winner of the SAP Security challenge&nbsp;of May 2018. James answered 6 questions correctly and wins the $50 gift card from Amazon.<\/p>\n<h3>Answers from May&#8217;s Challenge<\/h3>\n<p><strong>The user is on a different application server and you, therefore, do not see his failed authorization checks in SU53 and you want to switch to the same application server. How do you proceed?<\/strong><br \/>\nThe user&#8217;s SU53 display shows which application server is on. In transaction SM51, you can double-click on the application server of the user.<\/p>\n<p><strong>In which table can you see which tables are contained in a table group?<\/strong><br \/>\nYou can find the table group assignments in table TDDAT.<\/p>\n<p><strong>Which parameter defines the minimum number of characters that must be different in the new password compared to the old password?<\/strong><br \/>\nParameter login\/min_password_diff defines how many different characters the new password must have compare to the old password. Use the report RSPARAM and search for login* parameters to see the current value of all the login parameters.<\/p>\n<p><strong>In which transaction can you search the content of a transport request for a particular role?<\/strong><br \/>\nIn transaction SE03 you can search for objects in a request\/task and filter for the object ACGR (Role).<\/p>\n<p><strong>You want to schedule a background job under the name of the technical user <\/strong>ZXITING<strong>. What authorizations do you need for this?<\/strong><br \/>\nYou require S_BTCH_NAM with the respective value of the user in the BTCUNAME field.<\/p>\n<p><strong>You maintain the ACTVT 03 in the context of the FB03 in SU24. What kind of transport will you use to transport those changes?<\/strong><br \/>\nSU24 values are client-independent and hence require a workbench transport.<\/p>\n<p><strong>In which table can you generally change messages from errors to warnings for specific users but not for others?<\/strong><br \/>\nTable T100C controls the behavior of messages for users. You can maintain specific message through transaction OBA5.<\/p>\n<p><strong>Through which transaction can you adjust the settings in a CUA landscape so that local password changes are possible?<\/strong><br \/>\nIn transaction SCUM, you can define the behavior of fields in the user master record. You can define where a field can be maintained.<\/p>\n<p><strong>As of SAP Basis 7.50 SP03, what events can you log with the Security Audit Log (SAL)? (select all that apply)<\/strong><br \/>\nWith the Security Audit Log (SAL), you can record security-related activities in the system such as dialog and RFC logon attempts, transaction starts, changes to the user master, etc. As of SAP Basis 7.50 SP03, SAP delivers a new SAL with new transactions and capabilities. Xiting will blog about those changes in the next couple of weeks.<\/p>\n<p><strong>In the role authorizations in PFCG, what does the red light indicate?<\/strong><br \/>\nThe red light indicates that the org levels have not been maintained. Org levels need to be maintained centrally on the role level and not directly in the authorization object.<\/p>\n<p>&nbsp;<\/p>\n<h2>June Challenge<\/h2>\n<p>[qsm quiz=8]<\/p>\n<p>We wish you the best of luck in the challenge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#8217;t know? To help you identify those areas, Xiting has launched the SAP Security Challenge with a monthly quiz to test your knowledge. Stay tuned and follow our blog to broaden your skillset. We will publish [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9385,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1835],"tags":[145],"class_list":["post-3086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-securityquiz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Challenge &#8211; June 2018 - Xiting<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Challenge &#8211; June 2018\" \/>\n<meta property=\"og:description\" content=\"Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don&#039;t know? To help you identify\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-01T10:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-15T15:42:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"964\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Banzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Banzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/\"},\"author\":{\"name\":\"Alessandro Banzer\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\"},\"headline\":\"SAP Security Challenge &#8211; June 2018\",\"datePublished\":\"2018-06-01T10:00:41+00:00\",\"dateModified\":\"2026-02-15T15:42:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"keywords\":[\"securityquiz\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/\",\"name\":\"SAP Security Challenge &#8211; June 2018 - Xiting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"datePublished\":\"2018-06-01T10:00:41+00:00\",\"dateModified\":\"2026-02-15T15:42:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sap-security-blog-security-challenge.jpg\",\"width\":964,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/news\\\/sap-security-challenge-june-2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Challenge &#8211; June 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\",\"name\":\"Alessandro Banzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"caption\":\"Alessandro Banzer\"},\"description\":\"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Challenge &#8211; June 2018 - Xiting","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"SAP Security Challenge &#8211; June 2018","og_description":"Welcome to the&nbsp;SAP Security Challenge&nbsp;by Xiting. How much do you know about SAP Security? Do you know what you don't know? To help you identify","og_url":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2018-06-01T10:00:41+00:00","article_modified_time":"2026-02-15T15:42:56+00:00","og_image":[{"width":964,"height":600,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","type":"image\/jpeg"}],"author":"Alessandro Banzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Banzer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/"},"author":{"name":"Alessandro Banzer","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e"},"headline":"SAP Security Challenge &#8211; June 2018","datePublished":"2018-06-01T10:00:41+00:00","dateModified":"2026-02-15T15:42:56+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/"},"wordCount":677,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","keywords":["securityquiz"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/","url":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/","name":"SAP Security Challenge &#8211; June 2018 - Xiting","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","datePublished":"2018-06-01T10:00:41+00:00","dateModified":"2026-02-15T15:42:56+00:00","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/01\/sap-security-blog-security-challenge.jpg","width":964,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/news\/sap-security-challenge-june-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Challenge &#8211; June 2018"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e","name":"Alessandro Banzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","caption":"Alessandro Banzer"},"description":"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.","url":"https:\/\/xiting.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/3086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=3086"}],"version-history":[{"count":2,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/3086\/revisions"}],"predecessor-version":[{"id":46932,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/3086\/revisions\/46932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/9385"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=3086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=3086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=3086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}