SAP Authorizations - Links
×
SAP Basis
ABAP
Blog
×
SAP Basis
ABAP
Blog
×
SAP Basis
ABAP
Blog
×
SAP Basis
ABAP
Blog
Direkt zum Seiteninhalt
SAP Authorization - Links
What to do when the auditor comes - Part 1: Processes and documentation
What to do when the auditor comes - Part 1: Processes and documentation
What to do when the auditor comes - Part 1: Processes and documentation
What are the advantages of SAP authorizations?
What are SAP authorizations?
View system modifiability settings
Using suggestion values and how to upgrade
Using eCATT to maintain roles
Using eCATT to maintain roles
User Management
User Interface Client Permissions
User Interface Client Permissions
User Information System (SUIM)
User Information System (SUIM)
User administration (transaction SU01)
Use the authorisation route to identify proposed values for customer developments
Use SU22 and SU24 transactions correctly
Use SU22 and SU24 transactions correctly
Use SU22 and SU24 transactions correctly
Use SAP_NEW correctly
Use SAP Code Vulnerability Analyser
Use Custom Permissions
Use Central User Management change documents
Use automatic synchronisation in central user management
Use automatic synchronisation in central user management
Understanding SAP HANA Permissions Tests
Unclear responsibilities, especially between business and IT
Unclear objectives and lack of definition of own security standards
Unclear objectives and lack of definition of own security standards
Translating texts into permission roles
Translating texts into permission roles
Transactional and Native or Analytical Tiles in the FIORI Environment
THE "TOP SEVEN"
The SAP authorization concept
The SAP authorization concept
Testing Permission
Testing Permission
Temporarily disable Central User Management
Task & functionality of the SAP authorization concept
System Users
System Users
System trace function ST01
System Settings
Sustainably protect your data treasures with the right authorization management
SU2X_CHECK_CONSISTENCY & SU24_AUTO_REPAIR
Structural authorizations
Starting Web Dynpro ABAP applications
Starting reports
Standard authorisation
Solution approaches for efficient authorizations
Solution approaches for efficient authorizations
SIVIS as a Service
Set up permissions to access specific CO-PA measures
Set up permission to access Web Dynpro applications using S_START
Set up login locks securely
Service User
Security within the development system
Security within the development system
Security in development systems
Security in development systems
Security Automation for HR Authorizations
Search for user and password locks
Search for user and password locks
Schedule PFUD transaction on a regular basis
SAP systems: Control user authorizations with a concept
SAP Security Concepts
SAP Security Concepts
SAP S/4HANA® migration audit
SAP license optimization
SAP FICO Authorizations
SAP AUTHORIZATIONS: THE 7 MOST IMPORTANT REPORTS
SAP authorizations: Recommendations for setting up, monitoring and controlling
SAP Authorizations - Overview HCM Authorization Concepts
SAP Authorizations - Overview HCM Authorization Concepts
RSUSR008_009_NEW
RSUSR003
RSRFCCHK
RS_ABAP_SOURCE_SCAN
RS_ABAP_SOURCE_SCAN
Role Management
Risk: historically grown authorizations
Retain the values of the permission trace to the role menu
Retain the values of the permission trace to the role menu
Reset passwords using self service
Reset passwords using self service
Redesign of SAP® Authorizations
Rebuilding the authorization concept
Rebuilding the authorization concept
Query Data from a Local Table
Protect Passwords
PRGN_COMPRESS_TIMES
Preventing sprawl with the workload monitor
Permissions with status
Permissions with status
Permissions with Maintenance Status Changed or Manual
Permissions objects already included
Permissions checks
Permissions checks
Permissions and User Root Sets Evaluations
Permission implementation
Perform upgrade rework for Y landscapes permission proposal values
Perform Risk Analysis with the Critical Permissions Report
Our services in the area of SAP authorizations
Our services in the area of SAP authorizations
Organisationally restrict table editing permissions
Object S_BTCH_NAM and S_BTCH_NA1 (use of foreign users in Steps)
Object S_BTCH_ADM (batch administration authorization)
Object S_BTCH_ADM (batch administration authorization)
Note the maintenance status of permissions in roles and their impact
Note the maintenance status of permissions in roles and their impact
Mitigating GRC risks for SAP systems
Map roles through organisational management
Manual authorizations
Managed Services
Managed Services
Making the RESPAREA responsibility the organisational level
Making the RESPAREA responsibility the organisational level
Make mass changes in the table log
Make mass changes in the table log
Maintenance Status
Maintaining Authorization Objects (Transaction SU21)
Maintaining Authorization Objects (Transaction SU21)
Maintain transaction start permissions on call CALL TRANSACTION
Maintain transaction start permissions on call CALL TRANSACTION
Maintain transaction start permissions on call CALL TRANSACTION
Maintain table permission groups
Maintain derived roles
Maintain derived roles
Maintain derived roles
Maintain authorization objects more easily
Maintain authorization objects more easily
Maintain authorization objects more easily
Lock Inactive Users
List of required organisational levels and their value
Limitations of authorization tools
Limitations of authorization tools
Limit character set for user ID
Limit character set for user ID
Limit character set for user ID
Law-critical authorizations
Lack of know-how
Lack of definition of an internal control system (ICS)
Know why which user has which SAP authorization
Know why which user has which SAP authorization
Introduction & Best Practices
Integrate S_TABU_NAM into a Permission Concept
Integrate S_TABU_NAM into a Permission Concept
Include customising tables in the IMG
Include customising tables in the IMG
In the transaction, select SU10 by login data of users
In-house role maintenance
Immediate authorization check - SU53
Identify Executable Transaction Codes
Identify Executable Transaction Codes
Identify Executable Transaction Codes
ICS for business processes in SAP systems
How to analyze roles and authorizations in the SAP system
How to analyze roles and authorizations in the SAP system
Hash values of user passwords
Grant spool jobs
Grant permissions for SAP background processing
Grant permission for external services from SAP CRM
Goal of an authorization concept
Get an overview of the organisations and their dependencies maintained in the system
Generic access to tables
General considerations
General authorizations
General authorizations
Further training in the area of authorization management
Full verification of user group permissions when creating the user
Features of the SAP authorization concept
Features of the SAP authorization concept
FAQ
FAQ
Extend permission checks for documents in FI
Excursus Special feature for authorizations for FIORI Apps under S/4HANA
Even if key users (department users/application support) do not have to develop their own authorization objects and cooperation with SAP Basis is always advantageous, there are often technical questions such as "Which users have authorization to evaluate a specific cost center or internal order?
Evaluation of the authorization check SU53
Evaluation of the authorization check SU53
Evaluate Permission Traces across Application Servers
Essential authorizations and parameters in the SAP® environment
Error analysis for authorizations (part 1)
Ensuring secure administration
Ensuring secure administration
Encrypt e-mails
Encrypt e-mails
Emergency user concept
Efficient SAP rollout through central, tool-supported management
Efficient SAP rollout through central, tool-supported management
Edit Old Stand
Do not assign SAP_NEW
Do not assign SAP_NEW
Displaying sensitive data
Development
Deleting table change logs
Define security policy for users
Define S_RFC permissions using usage data
Define a user group as mandatory field in the user root
Default permissions already included
Debug ABAP programs with Replace
Debug ABAP programs with Replace
Data ownership concept
Customise SAP_ALL Profile Contents
Customise evaluation paths in SAP CRM for indirect role mapping
Custom requirements
Custom Permissions
Criticality
Criticality
Criticality
Create permissions for customising
Create order through role-based permissions
Correct settings of the essential parameters
Correct settings of the essential parameters
Copy values from the Clipboard to the transaction's PFCG permission fields
Copy the user from the Clipboard to the Transaction SU10 selection
Copy the user from the Clipboard to the Transaction SU10 selection
Coordinate authorisation management in customer-owned programmes
Controlling file access permissions
Consolidate user-level role mapping
Configure Security Audit Log
Conclusion
CONCLUSION
CONCLUSION
Concept for in-house developments
Compensating measures for segregation of duties conflicts
Compensating measures for segregation of duties conflicts
Communication User
Communication User
Check the SAP authorization concept
Check Profit Centre Permissions in FI
Check current situation
Check current situation
Check and refresh the permission buffer
Change management
Change documents
Challenges in authorization management
Centrally view user favourites
Calling RFC function modules
Bypass Excel-based Permissions Traps
Bypass Excel-based Permissions Traps
Best Practices Benefit from PFCG Roles Naming Conventions
Best Practices Benefit from PFCG Roles Naming Conventions
Basics SAP Authorizations including Fiori - Online Training
Basics SAP Authorizations including Fiori - Online Training
Basics SAP Authorizations including Fiori - Online Training
BASICS FOR USING SAP REPORTS
Basic administration
Basic administration
Background processing
AUTHORIZATIONS IN SAP SYSTEMS
Authorizations in SAP systems: what admins should look out for
AUTHORIZATIONS IN SAP SYSTEMS
Authorizations in SAP BW, HANA and BW/4HANA
Authorizations in SAP BW, HANA and BW/4HANA
AUTHORIZATIONS FOR BATCH PROCESSING IN THE SAP NETWEAVER AND S/4HANA ENVIRONMENT
AUTHORIZATIONS FOR BATCH PROCESSING IN THE SAP NETWEAVER AND S/4HANA ENVIRONMENT
AUTHORIZATIONS FOR BATCH PROCESSING IN THE SAP NETWEAVER AND S/4HANA ENVIRONMENT
Authorization tools - advantages and limitations
Authorization roles (transaction PFCG)
Authorization objects
Authorization objects of the PFCG role
Authorization objects
Authorization concepts in SAP systems
Authorization concepts in SAP systems
Authorization concepts - advantages and architecture
Authorization concepts - advantages and architecture
Authorization concept
Authorization concept - recertification process
Authorization concept of AS ABAP
Authorization concept of AS ABAP
Authorization concept
Authorization check
Authorization Analysis
Authorization Analysis
Audit Information System Cockpit
Audit Information System Cockpit
Assignment of roles
Assignment of roles
Assignment of critical authorizations and handling of critical users
Assign SAP_NEW to Test
Archive change document management for user and permission management
Architecture of authorization concepts
Apply User Management Solutions in SAP HANA
Apply User Management Solutions in SAP HANA
Analyze user buffer SU56
Analyze user buffer SU56
Advantages of authorization tools
Advantages of authorization concepts
Add New Organisation Levels
Add New Organisation Levels
Add External Services from SAP CRM to the User Menu
Add external services from SAP CRM to the proposal values
Activity level
Activity level
A concept for SAP authorizations prevents system errors and DSGVO violations
A concept for SAP authorizations prevents system errors and DSGVO violations
A concept for SAP authorizations prevents system errors and DSGVO violations
A complicated role construct
A complicated role construct
A complicated role construct
Zurück zum Seiteninhalt
Um diese Website nutzen zu können, aktivieren Sie bitte JavaScript.