The Story Of Star Notes

                                                                                                               […]

Interesting Errors In Currency Notes

Even with the demonetization hitting us hard to push towards digital payments, currency notes are still important in our daily lives. The need for paper currency has not reduced even after major digital revolutions. However, did you ever think how these currency notes are printed and released? In this article, we will discuss mistakes and […]

Interesting Errors In Postal Stationery

Philatelists love to have errors, freaks, and/or oddities (commonly referred to as EFO) in their collection. EFO are the stamps or stationery when anything goes wrong during the production process such as dry ink, incorrect perforation, etc., Postal authorities generally utmost care to ensure there are no mistakes or errors before they get the material […]

Story Of Pudukkottai Toli (1 Amman Cash Coin)

Vijaya Toli (also called as 1 amman cash coin) is one of the smallest coins in the Princely state coins. Vijaya toli was released by Pudokkotai (Prudhvikota) – a kingdom and later a princely (feudatory) state in British India, which existed from 1680 until 1948. The kingdom did not have fixed boundaries originally and was called […]

Limit The No. Of Line Items In SAP GRC ARM Request

While creating Access requests in SAP GRC, users might select too many roles which might result in Timeout error message during the submission, or Risk Analysis. To overcome this issue, the no.of line items can be limited by this small tweak. Here is an interesting video that details the steps to implement to limit the […]

SAP HANA Mini Checks – How They Can Help Security Consultants?

With the introduction of SAP HANA’s future execution model, it is the responsibility of SAP Security consultants to manage the SAP HANA DB security as well. Activities such as User Management, Role Management, Auditing HANA DB, Managing Privileges, and other reporting activities have to be performed by the security consultants. However, report generation is not […]

Allow Admin Users Only To Login To HANA Database

During specific system activities, you may need to lock all the other users except Admin users to log in to the HANA DB. It is a tedious task to manually de-activate and activate the users back. Here is an interesting and effective tip that can be a problem solver. Watch this video that details the […]

A Right Approach For Building SAP HANA Privilege Based Roles

Designing, configuring, and implementing SAP Security is a complex and resource-intensive task. Hence, companies should identify the right approach before building authorizations. This is also important when it comes to SAP HANA privilege-based roles. I have personally experienced and helped a few organizations with the design of the role definition approach. With this, I can […]

SAP Licensing Optimization MYTHS

SAP licensing optimization is always a complicated activity for many organizations. The various issues and/or problems faced in managing the SAP licenses makes it hard to stay compliant with the SAP agreements. More than 80% of businesses are struggling to maintain numbers correctly – they are either over or underutilizing their licensing assets. To optimally […]

The New Sap Security Tools To Simplify Authorization Tracing

Most of you might know and also have already worked with the STAUTHTRACE transaction code. For those who are still not aware of this transaction code or never used it before, STAUTHTRACE is an enhanced and user-friendly transaction code when compare to ST01 AUTH TRACE and is meant only for the authorization trace. Further, SAP has introduced […]