USE OF SECURE NETWORK COMMUNICATION
Generate and monitor a revision-proof permission concept tool-based: The established processes for entitlement management, role application and assignment are not documented at all or in a central location in your company? In the revision, it was noticed that a written authorisation concept does not exist, is not up to date or that the processes do not meet the requirements?
SAP Basis represents the cornerstone of the SAP system, i.e. the foundation without which the system cannot function. Furthermore, it includes some administration tools and middleware programs. These programs can be used with the help of SAP Basis independently of the operating system and database used.
A role concept according to best practice protects you from potential attacks within your SAP landscape. However, to protect your system from unauthorized access via the network, the SAP Gateway must be configured correctly. It enables the use of external programs via interfaces or the call of ABAP programs and serves as a technical component of the application server, which manages the communication of all RFC-based functions.
Some useful tips about SAP basis can be found on www.sap-corner.de.
INITIATE PILOT AND RESEARCH PROJECTS
SAP Basis is structured as a classic three-tier model. It contains the following components:
The presentation layer is the interface to the users. Through a graphical interface, users enter data or interact with data through the applications. This presentation layer exchanges data with the application layer.
Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".
For example, administrators define requirements and standards, select and control upgrades or enhancements, implement monitoring processes, and take care of necessary backups and emergency management.
To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.
If you are using this Emergency User Concept and following these steps, you can ensure: Each user on the production system retains his or her original necessary rights.