SAP Basis Introduction & Best Practices

Direkt zum Seiteninhalt
Introduction & Best Practices
SU53 Display authorization data
What do RFC interfaces and RFC security have to do with the play "Hauptmann von Köpenick" and the science fiction film "Minority Report"? Probably more than you like! RFC security and theatre?! Germany, Berlin, 1906: The 46-year-old cobbler Wilhelm Voigt dreams of returning to a normal life. After various convictions and many prison stays, he lives on the margins of society. It's not just the money he lacks. Above all, the lack of access to his social system makes him. In view of his impasse, he opts for a drastic measure. The excluded shoemaker pulls off and grates off several junk dealers to assemble a military uniform gradually. A few days later, he slips into the same disguise, successfully changes his identity and then swings through Berlin as Captain von Köpenick. He commandeers soldiers, storms the town hall and even detains the mayor. There is no doubt about the commands and their execution, because their true identity is veiled: Because of a simple disguise. A disguise that gives him all the necessary permissions he needs for his scam. At the end of the day, Wilhelm Voigt successfully compromised the Berlin government. RFC Security and Science Fiction?! USA, Washington, DC, 2054: The Washington police have long since stopped investigating murders: It prevents the killings right in advance. For this purpose, so-called "precogs" are used, which use precognition to predict and report murders in visions before they happen. At the same time, the government uses a system of public scanners that can identify all citizens clearly at any time by iris detection. One day, when policeman John Anderton himself appears as the culprit in a vision of the "Precogs," he flees the police building and decides to find out why.

Overall, the application layer is the link between the database layer on the one hand and the presentation layer on the other. Thus, the applications on the application layer request required data from the database in order to process it afterwards.

The website www.sap-corner.de offers many useful information about SAP basis.
Authorization management: preparation and follow-up of audits as well as ongoing or selective support
In order to meet the growing integration and coordination between internal IT departments and external service providers and suppliers, it is necessary to include a company-wide interface department in the IT organisation. The SAP basis can assume the coordination role and interface function in the environment of SAP products and technologies.

In order to fully exploit the advantages of SAP NetWeaver as an integration platform, professional care and maintenance of the components by experienced SAP developers is indispensable. Only under these circumstances can IT operations meet the requirements and work quickly, flexibly, innovatively and cost-effectively.

"Shortcut for SAP Systems" makes many tasks in the area of the SAP basis much easier.

In such cases, the Security Auditlog or SAL helps.

A note box in which data of all kinds can be quickly filed and retrieved. This is what Scribble Papers promises. At first, the program looks very spartan. But once a small structure is in place, you realise the great flexibility of this little helper.


STEP 10: PLANNING The planning provides a translation of the previously agreed definitions into concrete measures.
Zurück zum Seiteninhalt