ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com The security policies are created by the security team in isolation from the business team. False Determine whether this statement is true or false. SAP offers many types of systems and applications. Each type of SAP system (mySAP CRM, SAP BW, SAP R/3, mySAP SRM, SAP APO) is so varied that the systems do not share security tools or security services. False Determine whether this statement is true or false The following tools are available for conducting thorough system security audits. A Role maintenance tool B System audit log C CCMS security alert D System trace tools E Users and Authorizations information systems F All of the above Answer: F The Audit Information System is intended for external audits only. False All of the menu roles for the Audit Information System start with . The authorization roles start with . SAP_AUDITOR – SAP_CA_AUDITOR 1 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Configuring the Audit Information System requires downloading a specific support package. False To use the Audit Information System, you must use transaction SECR. Answer: False The instance parameters that relate to the audit log include rsau parameters? Answer: True Determine whether this statement is true or false The security audit log only logs user connections made by RFC connections. False Determine whether this statement is true or false Which of the following are benefits of creating a custom t-code to link SE16 to a specific table? A You no longer need to grant access to transaction code SE16. B With your custom transaction code, you can look at any table. C With your custom transaction code, you can look only at the table specified in the transaction code. D Custom transaction codes can be easily created, without requiring any programming. Answer: A, C, D 2 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which authorization objects can you examine to determine if security is administered centrally or regionally? A S_USER_GRP B S_TCD_GRP C S_USER_AGR D S_USER_ADD Answer: A, C Which of the authorization objects protect transaction code execution? A S_TCODE B P_TCODE C Q_TCODE D X_TCODE Answer: A, B, C SAP recommends that each custom report and each custom program be linked to a custom transaction code. Answer: True Determine whether this statement is true or false S_PROGRAM is an authorization object that protects program execution. Answer: True Determine whether this statement is true or false is a program that assigns authorization groups to ABAP programs. Answer: RSCSAUTH 3 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com You should be careful with the authorization object because it can enable someone to enter DEBUG mode in production. Answer: S_DEVELOP Once a user is changed, there is no way to see who changed the user. Answer: False Determine whether this statement is true or false The Authorization Group field is used only for protecting reports and tables. Answer: False Determine whether this statement is true or false Which of the following are logs that exist in an SAP system? (More than one answer is correct). A Webflowlogs B Application logs C Change documents logs D User and authorization change logs E None of the above Answer: A, B, C, D SU24 must be set up before implementing any roles. Answer: False (Optional feature) Determine whether this statement is true or false 4 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com SU24 requires programming changes to make the default values occur. Answer: False Determine whether this statement is true or false The following logon parameters can be used to ensure your system is adequately secured. A logon/fails_to_user_lock B logon/min_password_specials C logon/min_password_diff D logon/named_super_user Answer: A, B, C SAP recommends that you separate your system from your system. Answer: Devlopment – Production Which of the following are security advantages to a three-tier landscape? A Ensure changes occur only on development system. B Ensure changes occur only on your production system. C Developers do not have access to production data. D You control when changes are moved into production. E You can test changes in a QA system. Answer: A, C, D, E What type of approval does SAP recommend before moving changes into production? SAP QA approval procedure that formalize the approval and review workflow 5 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com SAP recommends a three-tier system landscape including development, quality assurance, and production. Answer: True Determine whether this statement is true or false Client change options should always be set to No changes allowed. Answer: False Determine whether this statement is true or false SAP does not provide a QA approval procedure for changes being moved into production. Answer: False Determine whether this statement is true or false The user ID used in the RFC destination should be a dialog user. Answer: False Determine whether this statement is true or false Authorization object is used to protect what names job steps are scheduled to run under. Answer: S_BTCH_NAM 6 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com 6 aspects that might be considered in a security policy User authentication (Password rules, Monitoring) Authorization protection Auditing and logging (AIS, Security audit log, …) Integrity protection Privacy protection Proof of obligation (non-repudiation) 7 questions that a security policy should address? Who is responsible for your IT security? What needs to be protected? Who is attacking? What is the risk? Which protection mechanisms are required? Which procedures are to be enforced? How much protection can you afford? 6 tools available to help provide answers to the questions that arise during a system security audit: Audit Information System Authorization Information System System Audit Log Computer Center Management System Alerts Trace tools Role maintenance tool (PFCG) menu What are the 3 major components of the Role maintenance tool (PFCG)? authorizations users Menu roles What are the 2 types of roles implementation strategy? Authorization roles 7 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the 2 major categories of the AIS - system audit (general system, users and authorizations, repository and tables) - business audit (accounting, customer, vendors, asset, tax) What was the transaction used by SAP in the past to access the AIS In the past, the Audit Information System existed in a single transaction code, SECR What are the two major groups of SAP Standards roles defined for the Audit Information System Menu roles (SAP_AUDITOR*) (only menu items; no authorizations) Authorization roles (SAP_CA_AUDITOR*) (only authorizations, no menu items listed) What is the SAP standard composite menu and authorization Role which contains every role in the AIS? The menu roles: SAP_AUDITOR The authorization roles: SAP_CA_AUDITOR What are the 4 steps required to set-up the AIS Copy the SAP roles to your own naming convention Update the roles (as needed) Create a user for the auditor Assign the roles you created to the audit user 8 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which SAP Standard role allow you to set-up the AIS? SAP_AUDITOR_ADMIN What is the audit log’s main objective? (3 points) Security-related changes to the SAP system (changes to user master records) Higher level of transparency (successful and unsuccessful logon attempts) Enables the reconstruction of a series of events (successful or unsuccessful transaction starts) Which 7 information types can be recorded with the Security audit log? Successful and unsuccessful dialog logon attempts Successful and unsuccessful RFC logon attempts Remote function calls (RFCs) to function modules Successful and unsuccessful transaction starts Successful and unsuccessful report starts Changes to user master records Changes to the audit configuration SAP systems maintain their audit logs on a daily basis. The system does not delete or overwrite audit files from previous days; it keeps them until you manually delete them. Which transaction is used in order to archive or delete the audit files? SM18 How do you define the audit file name and location? You define the name and location of the files in a profile parameter, rsau/local/file. 9 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the information (9) contained in an audit record Event identifier (a three-character code) SAP user ID and client Terminal name, Transaction code Report name, Time and date when the event occurred Process ID, Session number Miscellaneous information How do you define the maximal size of the audit file? You define the maximum size of the audit file in the profile parameter rsau/max_diskspace/local. The default value is 1 megabyte (MB) or 1000000bytes What happened if the maximal size of the audit file is reached? If the maximum size is reached, the auditing process stops. What are the 4 major filters available for the security audit log? Client, User, Audit class: Dialog logon, RFC/CPIC logon, Remote function call (RFC), Transaction start, Report start, User master change Weight of events to audit: Audit only critical, Audit important and critical, Audit all events (non-critical) Create and save filters permanently in the database (all the application servers use identical filters, define filters only once, you must restart the instance, define different profiles that you can alternatively activate) What are the 2 main options to create and save audit filters? Change filters dynamically (changes distributed to all active application servers, do not have to restart the instance, not saved for reuse after system stops/starts) 10 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the profile parameters that you need to specify in order to create and save filters permanently in the database? rsau/enable: enable the SAL rsau/local/file: file location rsau/max_diskspace/local: max space to allocate rsau/selection_slots: number of filter to allow What are the profile parameters that you need to specify in order to change filters dynamically on one or more application servers? rsau/local/file: file location rsau/max_diskspace/local: max space to allocate rsau/selection_slots: number of filter to allow With which transaction can you assess the security audit log? SM20 or SM20n What are the four main sections of the audit analysis report? Introductory information Audit data Statistical analysis Contents What are the 4 main functions of the Computing Center Management System (CCMS) monitor? Performs detailed monitoring Creates alerts and displays them with colour values Provides analysis and auto-reaction methods (sms, emails with threshold ) Allows you to view current alerts and the history of alerts 11 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What is the transaction to access the CCMS alert monitor RZ20 What are the 5 majors authorisation objects used to protect which transaction codes a user can access and for which product are they meant to be? S_TCODE used in every SAP system for every module P_TCODE used for Human Resources Q_TCODE used for Quality Maintenance I_TCODE used for Plant Maintenance L_TCODE used for Warehouse Management Which authorithation object determines what table someone can look at with the transactions SE16, SE16N, or SE17; SM30 or SM31; and SE12 S_TABU_DIS is checked anytime someone looks at data in a table directly (with one of these transactions: SE16/SE16N, SE17, SM30, SM31. or the Implementation Guide). Which transaction should be used when access to a table and why? When access is required, use transaction code SM30 because an interface exist and no direct access to the table. What are the 2 fields of the authorization object S_TABU_DIS Activity and Authorization Group. The Authorization Group field is mapped to which tables a user can access. 12 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which table maps the Authorization Group to a list of tables? TDDAT Which authorization object control the authorization to execute a program the authorization object S_PROGRAM User Action: start the program or schedule it to run in batch mode or if you use variants. Which fields use the authorization object S_PROGRAM Authorization Group: which programs you can execute. What should be set up in order for the authorization object S_PROGRAM to be effective? For this authorization object to be effective, ABAP programs must have an authorization group assigned to them in the attributes of the program. What program allows you to assign an authorization group to all executable programs or to individual programs or program group? RSCSAUTH 13 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Authorization object: S_PROGRAM User action: SUBMIT Authorization group: No value required What are the accesses required in order to run transaction SA38? - Include an Authorization Group on the program for all custom reports/programs developed. Use report RSCSAUTH to assign Authorization Group values to programs/reports - Request all custom reports/programs to include at least one AUTHORITY-CHECK inside the code. 2 options to secure the use of SA38 For what is the Authorization Group field used? Check access to tables Check access to program Used in varying ways throughout SAP applications, like e.g. FS00 Which authorizations object do you use to grant access to all ABAP Workbench components S_DEVELOP is the general authorization object for ABAP Workbench objects 6 ABAP Workbench components that are protected with S_DEVELOP ABAP development tools ABAP Dictionary and Data Modeler Screen Painter and Menu Painter Function Builder Repository Browser and Info System SAP Smart Forms 14 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the 6 types of logs? Application logging Logging workflow execution / webflow Logging using change documents Logging changes to table data Logging changes made using transport system Logging changes made to user and authorization Which transactions are used to maintain and analyze the application log? SLG1, display SLG0, define entries for your own application What does the application log trace? The log traces application events and tasks, and reports on their activity (for example, transfer of data from SAP R/3 to SAP APO). Which activities are logged in the webflow log? The webflow log (or workflow log) includes all activities that have occurred due to workflows executing. Which transactions allow you to analyze the webflow? SWI5, SWI2_FREQ and SWI1 15 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What is the transaction to view the change document for an object SCDO What is the structure of the change document? Change document header Change document item (old and new values of a field) - U(pdate) . Data was changed. - I(nsert) - D(elete) . Data was deleted Change document number MM04 for material changes and VD04 for customer changes. What are for example the transactions to review change documents for MM and SD? Each application has its own transaction to review change documents Which transaction displays the table change log? SCU3 In which table are the table change logged? DBTABPRT 16 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com rec/client parameter: = ALL (logs all clients), = 000 [,...] (logs the specified clients), = OFF (turns logging off). What is the configuration required in order to use the table change log? In the technical settings (use transaction SE13, SE12), set the Log data changes flag for those tables that you want to have logged. What does the transport system log record? A transport system log monitors all changes that are migrated from development to production. Which transactions allow you to view the transport system log? SE09 and SE10 What does the user and authorization log records? User and authorization logs record all changes that occur to users, authorizations, and profiles. Which transaction allows you to read the HR Reports logs in order to see each time the report is started? RPUPROTD (Log of report status) 17 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com 3 situations where the security administrator might want to use the transaction SU24 (maintain tables that assign which authorization objects go with which transaction codes)? Correct authorization objects that are not linked to transaction codes correctly Correct authorization objects that have unacceptable default values Change default values to ones that will always be appropriate How to find out who made a change with the transaction su24? 1. Start transaction SE16. 2. Enter USOTB_C in the Table Name field. 3. Use values in the Modifier, ModDate, and ModTime fields CM = Check/Maintain C = Check N = No Check U = Unmaintained. What are the 4 check indicators? What are the properties of the check indicator CM = Check/Maintain Authorization check is carried out against this object. PFCG creates an authorization for this object Field values are displayed for changing. Default values for this authorization can be maintained. What are the properties of the check indicator C = Check Authorization check is carried out against this object. PFCG does not create an authorization for this object. Field values are not displayed. No default values for this authorization can be maintained. 18 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the properties of the check indicator N = No Check Authorization check against this object is disabled. PFCG does not create an authorization for this object. Field values are not displayed. No default values for this authorization can be maintained. What are the property of the check indicator U = Unmaintained No check indicator is set. Authorization check is always carried out against this object. PFCG does not create an authorization for this object, Field values are not displayed. Can the checked for the authorization objects from the Basis (S*) and HR management (P_*, PLOG*) be changed? Authorization objects from the basis (S*) and Human Resources management applications (P_*, PLOG) cannot be excluded from checking because the field values for these objects must always get checked. What are the 10 components of the User information system (SUIM)? Overview of Users, Users, Roles, Profiles Authorizations, Authorization object Transactions Comparisons (of users) Where-Used list (for authorization) Change documents (for users, auth and profiles) In a centralized security environment, one group is responsible for all security tasks: creating users, creating roles, and assigning roles to users. What is the difference between centralized and decentralized security administration? In a decentralized security environment, multiple groups work on security (physical location, based on division, based on product line, or based on company code). 19 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the 3 different administrator types in a decentralized security administration? User administrator (create user, assign roles) Authorization administrator (create roles) Profile administrator (generate role). Which authorization object is provided to create and maintain users and assignments in a decentralized fashion with user groups? S_USER_GRP Which authorization object helps you to enforce the role naming convention in restricting the allowed roles names? S_USER_AGR Which authorization object ensure that the decentralized admin only add authorized t-codes to roles S_USER_TCD Which authorization object can be used to ensure the security administrator only add value for a specific company code? S_USER_VAL 20 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which authorization enforces that one person can create the menu portion of the role, but someone else updates the authorizations? S_USER_AUT Which authorization object enforces that one person can create the role, but another person must generate the role? S_USER_PRO What is the transaction for the system trace tool? ST01 SAP* What are the 2 special users defined in client 000? DIDIC Define the profile parameter logon/no_automatic_user_sapstar, with the value 0 Create a user master record for SAP* Give this user no roles or profiles. Give him a new password How can you deactivate the user SAP*? 21 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com In which client is the user Earlywatch delivered? Earlywatch is delivered in the client 066 What is the default password of the special user EarlyWatch? SUPPORT To prohibit the use of a password, enter it in table USR40. There are two wildcard characters: How can you prohibit the use of certain passwords? ? stands for a single character * stands for a sequence of any combination characters of any length Which transaction allows you to maintain the profile parameters? RZ11 What are the 5 profiles parameters that enforce the minimum requirement that a password must fulfil? logon/min_password_lng: min length logon/min_password_digits: min number of digits logon/min_password_letters: min number of letters logon/min_password_specials: min number of special characters logon/min_password_diff: how many characters in the new password must be different from the old password 22 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the 3 profiles parameters that enforce the validity period of a password? logon/password_expiration_time logon/password_max_new_valid: Validity period of passwords for newly created users logon/password_max_reset_valid: Defines the validity period of reset passwords What are the 3 profile parameters that enforce the multi logon for a user? logon/disable_multi_gui_logon: Controls the deactivation of multiple dialog logons logon/disable_multi_rfc_logon: Controls the deactivation of multiple RFC logons logon/multi_logon_users: List of excepted users (multiple logon) What are the 3 profile parameters that enforce the number of unsuccessful logon attempts? logon/fails_to_session_end: number of unsuccessful logon attempts before the system does not allow any more logon attempts logon/fails_to_user_lock: number of unsuccessful logon attempts before the system locks the user. logon/failed_user_auto_unlock: Defines whether user locks due to unsuccessful logon attempts should be automatically removed at midnight logon/disable_password_logon Which 2 profile parameter controls the deactivation of password-based logon for users or for groups? logon/password_logon_usergroup Which profile parameter specifies the default client that is automatically filled in on the system logon screen? logon/system_client 23 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which profile parameter specifies the exactness of the logon timestamp? logon/update_logon_timestamp Which profile parameters specifies the number of seconds until an inactive user is automatically logged out? rdisp/gui_auto_logout 6 security advantages that a three-tier system landscape can offer? Changes take place in only one location Developers do not have access to production data. Test in a QA system before they take effect in prod. Control the point in time when changes take effect Reduce accidental or unauthorized changes Keep a record of changes for auditing purposes Which transaction allows you to see if the TMS Quality Assurance approval procedure has been set up? STMS What are the 3 standards approval steps and their authorization object, value and default value? By request owner Default: inactive. Values of S_CTS_ADMI: CTS_ADMFCT Value: TADM and TQAS By user department. Inactive. Values of S_CTS_ADMI: CTS_ADMFCT Value: QTEA or TADM and TQAS By system administrator. Default: inactive. Values of S_CTS_ADMI: CTS_ADMFCT Value: TADM and TQAS 24 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which transaction allows you to approve a transport request? STMS At which level is it possible to enforce the changes? System and client level What defines the transport routes? Transport routes define where changes are made, and how the changes migrate through the system landscape after they have been released. In which transaction can you release the change request to transport? SE09 or SE10 What are the 5 steps of a transport 1. Release the change request 2. Review the log files 3. Import the SAP system objects into the target system. 4. Review the log files created by the Workbench Organizer. 5. Test your imports thoroughly 25 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com 4 roles and responsibilities in the transport process Team members: Releasing their own Project leader: Verifying the contents of a change request prior to release Transport administrator: Execute the transport tasks Quality Assurance (QA) team: tests the entire functionality and integration 3 security checks to consider before the development work are moved to production? - Link custom programs to custom transaction codes - Include AUTHORITY-CHECK statements for all programs - Ensure proper controls are in place if this custom program (or function module) accesses critical tables What are the authorization object and their fields that allow you to work with transport? S_TRANSPRT is the authorization object for the Transport Organizer. Fields: Activity, Request type CUST: Customizing requests DTRA: Workbench requests TASK: Tasks (repair or correction … Which authorization object and its field enforce the administration function in the change and transport system? S_CTS_ADMI, field: CTS_ADMFCT TABL: Maintain transport routes, call certain tools INIT: Set system change option IMPA: Import all transport requests IMPS: Import individual requests TADD: Perform an “add to buffer” … What are the predefined authorizations in SAP systems that apply to the 5 various roles for the transport process? Quality Assurance (QA) team: not defined Administrator (transport super user): S_CTS_ALL Project leader: S_CTS_PROJEC Team members and developers: S_CTS_DEVELO End users: S_CTS_SHOW 26 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What is the table for maintaining system clients? T000 What do the values of the table TMSTCRI prevent? You can protect certain objects from being changed by imports by defining a set of security-critical objects in table TMSTCRI. You are then warned of changes to these objects in transport requests. What are the four primary authorization objects used in background processing? S_BTCH_JOB: Job Operations, Values DELE, RELE (release), SHOW, PROT (Display job logs) S_BTCH_NAM: protects what user IDs can execute S_BTCH_ADM: Value Y for the Background admin S_RZL_ADM: Field Name, 01 (Create), 03 (Display) if the background job executes an external cmd. SM36: create background jobs. What are the transactions to create and monitor background jobs? SM37: monitor background jobs. User ID is stable; the user never changes jobs The password does not have to be reset. No one can log on Facilitates security administration and maintenance of background schedule. 4 reasons to use specific System user IDs for background jobs 27 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which authorizations are needed to allow a user to have a look only at their spool request? Give them S_TCODE with SM37 and SP02 No other authorization objects are required to view spool Which SAP standard roles gives access required to administer background jobs SAP_BC_BATCH_ADMIN What 3 kind of job steps can be executed when creating a background job? ABAP program External command: from the operating system are executed from SAP External program: at the operating system (Ex: file read) Which 2 authorizations are needed in order to create background job with external program job steps? You must have activity 01 for the authorization object S_RZL_ADM (maintain) and access to S_LOG_COM (execute) Which authorization object define which printers you can print to? S_SPO_DEV 28 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which authorization object enforce actions you can take with spool requests (Admin) and enforce access to a spool request that does not belong to you? S_SPO_ACT Which authorization object enforces administering the spool system (Admin)? Values SP01, SP0R, SPAA, SPAB, SPAC, SPAD, SPAM, SPAR, SPTD, SPTR S_ADMI_FCD Which authorization object limit the number of pages a user can print to a specific printer? S_SPO_PAGE What is the SAP standard role for spool administration? SAP_BC_SPOOL_ADMIN 4 examples of external commands executed within SAP? - Database backup tools such as brbackup - Operating system environment commands - List directories and space available at the operating system - Execute sap router 29 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the 3 ways to execute external commands? - External commands can be executed either with - Transaction SM49 (SM69 to create) - ABAP programs - In background job steps How is the external command defined in the SAP system? An external command is an alias defined in the SAP system that represents an operating system command. What are the authorizations needed to create and maintain an external command? SM69, S_RZL_ADM with the value 01,03(Activity field) What are the 3 different fields of the S_LOG_COM authorization object? Command (name of external command) Opsystem (operating system for the command) Host (symbolic host name of target system) Standard list download What are the 2 ways in use to download lists? Application-specific implementations for downloading (Excel for ex) 30 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com Which authorization object protects the standard list download? S_GUI Which authorization objects protect the file access? Authorizations object S_DATASET. The minimum activities required are 33 (normal file read) and A6 (read file with filter). What are the 2 user types that should be used for RFC communication? User IDs in RFC destinations should be set up as communication or system users: Æsomeone cannot log on with the userID Æthe passwords normally do not expire Which transaction lists each RFC destination and the user involved? RSRFCCHK Which authorization object is checked when a user invokes a RFC? object S_RFC 31 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com What are the 3 fields of the authorization object S_RFC? - Type of RFC object to be protected - Name of RFC to be protected - Activity Which profile parameter can you use in order to specify the use of S_RFC? auth/rfc_authority_check How is the authentication done when an RFC destination has no user Id provided and the current user field is selected? When this RFC destination is invoked, the user ID that will be used is the ID of the person who invoked this RFC destination. What are the values possibilities for the profile parameter auth/rfc_authority_check? 0 = No authorization check 1 = Authorization check active (no check for same user, no check for same user context and SRFC-FUGR). 2 = Authorization check active (no check for SRFCFUGR) 9 = Authorization check active (SRFC-FUGR checked) What is the default Communication RFC user set up for the transport management? TMSADM 32 ADM950 – SAP Security consultant certification flashcards – julien.moix@gmail.com How is the system called to set up a trusted relationship and allow user logging based on this trusted relationship for transport? TMS Trusted Services Which authorization object gives access to many administration functions? S_ADMI_FCD 33