SAP Basis SAP Administration I

Direkt zum Seiteninhalt
SAP Administration I
TECHNICAL LEAD (TL)
The main benefit of the implementation of the above recommendations lies in the creation and documentation of the innovative power of the SAP basis. Through consistent research and testing, the SAP basis is enabled to assume its role as an innovation driver. It also creates an attractive and exciting working environment for employees. By being involved in projects in a timely manner, project success will be promoted and will contribute to company success in the medium and long term. One possible consequence of the constant overuse of the employees is the reorientation of the employees and the associated loss of knowledge. This can also lead to the complete basic activity being carried out by external partners, to which a dependency relationship then arises.

SAP HANA base administrators can master the database in a way that wasn't possible back then. The SAP database is much more self-healing. Errors do less damage, are easier to detect and fix, and are less likely to impact system performance and availability before they are fixed. Monitoring tools can automatically scan the application logs, identify potential errors, and even suggest fixes, making it much easier to get to the root of the problem.

On www.sap-corner.de you will also find useful information about SAP basis.
WE19 Test tool for IDoc processing
SAP Basis Training starts at the very beginning of the project. Starting with a meticulous documentation of our work. We involve your internal employees from the very beginning.

The security of an SAP system requires protection against unauthorised access, e.g. through the secinfo and reginfo files. A cleanly implemented authorisation concept protects against attacks within the SAP system. However, it is also possible to attack your SAP system via the network. Through the RFC Gateway Server, your system communicates with external servers and programmes. One particularly effective way to protect against this are so-called Access Control Lists (ACL). Find out what this is and how you can use it to better protect your SAP system. The SAP Standard offers different approaches for gate protection. All methods combined can provide even greater safety. For example, it is possible to use Access Control Lists (ACL) to monitor exactly which external programmes and which hosts can communicate with the gateway. Another option is to configure the gateway to support Secure Network Communication (SNC). Finally, there are various security parameters for the gateway. This article focuses on the use of ACL files such as secinfo and reginfo files. What is an ACL? Access control lists are files in which permitted or prohibited communication partners can be recorded. For the gateway to use these ACL files, parameters must be set in the default profile of the SAP system and of course the files must be maintained accordingly. With the help of logs and traces, which can be configured for this purpose, a precise investigation can be made in advance of the activation, which connections currently run via the gateway. This allows them to prevent important applications with which your system communicates from being blocked by the ACL files. The rules in the ACL files are read from top to bottom of the gateway to decide whether to allow a communication request. If none of the rules matches the requesting programme, it will be blocked. Network-based ACL The network-based ACL file contains permitted and prohibited subnets or specific clients.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

SAP Basis Operation is responsible for ensuring the technical functionality of an SAP system.

The freeware Scribble Papers puts an end to the confusing paper chaos. The tool is also suitable for storing, structuring and quickly finding text documents and text snippets of all kinds in addition to notes.


There are very many constellations of SAP systems and databases.
Zurück zum Seiteninhalt