SAP Authorizations - Links
×
SAP Basis
ABAP
Blog
×
SAP Basis
ABAP
Blog
×
SAP Basis
ABAP
Blog
×
SAP Basis
ABAP
Blog
Direkt zum Seiteninhalt
SAP Authorization - Links
Add External Services from SAP CRM to the User Menu
Add New Organisation Levels
Adjust tax audit read permissions for each fiscal year
Adjust tax audit read permissions for each fiscal year
Advantages of authorization concepts
Advantages of authorization concepts
Advantages of authorization concepts
Advantages of authorization concepts
Analyse and evaluate permissions using SAP Query
Analysis and reporting tool for SAP SuccessFactors ensures order and overview
Analysis and reporting tool for SAP SuccessFactors ensures order and overview
Analyze user buffer SU56
Analyze user buffer SU56
Analyze user buffer SU56
Analyzing the quality of the authorization concept - Part 1
Application Permissions
Application Permissions
Apply User Management Solutions in SAP HANA
Architecture of authorization concepts
Architecture of authorization concepts
Architecture of authorization concepts
Archive change document management for user and permission management
Assignment of critical authorizations and handling of critical users
Assignment of critical authorizations and handling of critical users
Assignment of critical authorizations and handling of critical users
Assignment of critical authorizations and handling of critical users
Assignment of roles
Assignment of roles
Assign SAP_NEW to Test
Assign SAP_NEW to Test
Assign SAP_NEW to Test
Audit Information System Cockpit
Audit Information System Cockpit
Authorizations
Authorizations
AUTHORIZATIONS FOR BATCH PROCESSING IN THE SAP NETWEAVER AND S/4HANA ENVIRONMENT
Authorizations in SAP BW, HANA and BW/4HANA
AUTHORIZATIONS IN SAP SYSTEMS
AUTHORIZATIONS IN SAP SYSTEMS
Authorizations in SAP systems: what admins should look out for
Authorization Analysis
Authorization Analysis
Authorization check
Authorization check
Authorization concept
Authorization concepts - advantages and architecture
Authorization concepts in SAP systems
Authorization concepts in SAP systems
Authorization concept - recertification process
Authorization concept - recertification process
Authorization concept - user administration process
Authorization concept - user administration process
Authorization concept - user administration process
Authorization concept of AS ABAP
Authorization objects
Authorization objects of the PFCG role
Authorization object documentation
Authorization object documentation
Authorization roles (transaction PFCG)
Authorization tools - advantages and limitations
Automatically pre-document user master data
A complicated role construct
A concept for SAP authorizations prevents system errors and DSGVO violations
A concept for SAP authorizations prevents system errors and DSGVO violations
A concept for SAP authorizations prevents system errors and DSGVO violations
BASICS FOR USING SAP REPORTS
Basics SAP Authorizations including Fiori - Online Training
Best Practices Benefit from PFCG Roles Naming Conventions
Best Practices Benefit from PFCG Roles Naming Conventions
Best Practices Benefit from PFCG Roles Naming Conventions
Bypass Excel-based Permissions Traps
Centrally review failed authorisation checks in transaction SU53
Centrally review failed authorisation checks in transaction SU53
Centrally view user favourites
Challenges in authorization management
Challenges in authorization management
Change documents
Change documents
Checking at Program Level with AUTHORITY-CHECK
Check current situation
Check current situation
Check for permissions on the old user group when assigning a new user group to a user
Check for permissions on the old user group when assigning a new user group to a user
Check for permissions on the old user group when assigning a new user group to a user
Check for permissions on the old user group when assigning a new user group to a user
Check Profit Centre Permissions in FI
Check Profit Centre Permissions in FI
Check the SAP authorization concept
Communication User
Communication User
Communication User
Compare Role Upgrade Permissions Values
Compare Role Upgrade Permissions Values
Compensating measures for segregation of duties conflicts
Compensating measures for segregation of duties conflicts
CONCLUSION
CONCLUSION
Conclusion
Configure Security Audit Log
Consolidate user-level role mapping
Controlling file access permissions
Controlling file access permissions
Controlling file access permissions
Controlling permissions for the SAP NetWeaver Business Client
Coordinate authorisation management in customer-owned programmes
Coordinate authorisation management in customer-owned programmes
Coordinate authorisation management in customer-owned programmes
Coordinate authorisation management in customer-owned programmes
Copy the user from the Clipboard to the Transaction SU10 selection
Copy the user from the Clipboard to the Transaction SU10 selection
Copy the user from the Clipboard to the Transaction SU10 selection
Copy values from the Clipboard to the transaction's PFCG permission fields
Copy values from the Clipboard to the transaction's PFCG permission fields
Create permissions for customising
Create permissions for customising
Create permissions for customising
Criticality
Critical authorizations
Critical authorizations
Critical authorizations
Critical authorizations
Customise evaluation paths in SAP CRM for indirect role mapping
Customise Permissions After Upgrade
Customise Permissions After Upgrade
Customise SAP_ALL Profile Contents
Customise SAP_ALL Profile Contents
Customise SAP_ALL Profile Contents
Customising User and Permissions Management
Customising User and Permissions Management
Customizing
Custom Permissions
Custom Permissions
Custom requirements
Custom requirements
Custom requirements
Custom requirements
Data ownership concept
Debug ABAP programs with Replace
Default permissions already included
Define a user group as mandatory field in the user root
Deleting table change logs
Deleting table change logs
Deleting table change logs
Deleting versions
Deletion of change documents
Deletion of change documents
Deletion of change documents
Detect critical base permissions that should not be in application roles
Detect critical base permissions that should not be in application roles
Determine Permissions Error by Debugging
Displaying sensitive data
Displaying sensitive data
Dissatisfaction and unclear needs in the process
Dissatisfaction and unclear needs in the process
Do not assign SAP_NEW
Edit Old Stand
Edit Old Stand
Edit Old Stand
Edit Old Stand
Efficient SAP rollout through central, tool-supported management
Efficient SAP rollout through central, tool-supported management
Eligibility proposal values
Eligibility proposal values
Emergency user concept
Emergency user concept
Emergency user concept
Emergency user concept
Ensuring secure administration
Ensuring secure administration
Equal permissions
Equal permissions
Error analysis for authorizations (part 1)
Evaluate licence data through the Central User Management
Evaluate Permission Traces across Application Servers
Evaluate Permission Traces across Application Servers
Evaluation of the authorization check SU53
Evaluation of the authorization check SU53
Even if key users (department users/application support) do not have to develop their own authorization objects and cooperation with SAP Basis is always advantageous, there are often technical questions such as "Which users have authorization to evaluate a specific cost center or internal order?
Extend permission checks for documents in FI
Features of the SAP authorization concept
Features of the SAP authorization concept
Full verification of user group permissions when creating the user
Full verification of user group permissions when creating the user
Further training in the area of authorization management
Further training in the area of authorization management
Get an overview of the organisations and their dependencies maintained in the system
Get an overview of the organisations and their dependencies maintained in the system
Grant permissions for SAP background processing
Grant permission for external services from SAP CRM
Grant spool jobs
Handle the default users and their initial passwords
Hash values of user passwords
Hash values of user passwords
Hash values of user passwords
How to analyze roles and authorizations in the SAP system
How to analyze roles and authorizations in the SAP system
ICS for business processes in SAP systems
ICS for business processes in SAP systems
Identify Executable Transaction Codes
Immediate authorization check - SU53
Immediate authorization check - SU53
Implementing CRM Role Concept for External Services
Implementing CRM Role Concept for External Services
Implementing CRM Role Concept for External Services
Implementing Permissions Concept Requirements
Implementing Permissions Concept Requirements
Implementing Permissions Concept Requirements
Implementing Permissions Concept Requirements
Implementing the authorization concept in the FIORI interface
Important components in the authorization concept
In-house role maintenance
Include customising tables in the IMG
Include customising tables in the IMG
Installing and executing ABAP source code via RFC
Installing and executing ABAP source code via RFC
Integrate S_TABU_NAM into a Permission Concept
Introduction & Best Practices
Introduction & Best Practices
In the transaction, select SU10 by login data of users
In the transaction, select SU10 by login data of users
In the transaction, select SU10 by login data of users
Know why which user has which SAP authorization
Know why which user has which SAP authorization
Lack of definition of an internal control system (ICS)
Lack of definition of an internal control system (ICS)
Lack of know-how
Lack of know-how
Law-critical authorizations
Limitations of authorization tools
Limitations of authorization tools
Limit character set for user ID
Limit character set for user ID
List of required organisational levels and their value
List of required organisational levels and their value
Lock Inactive Users
Lock Inactive Users
Lock Inactive Users
Maintaining Authorization Objects (Transaction SU21)
Maintaining Authorization Objects (Transaction SU21)
Maintain authorization objects more easily
Maintain batch job suggestion values
Maintain batch job suggestion values
Maintain derived roles
Maintain derived roles
Maintain generated profile names in complex system landscapes
Maintain generated profile names in complex system landscapes
Maintain generated profile names in complex system landscapes
Maintain permission values using trace evaluations
Maintain proposed values using trace evaluations
Maintain proposed values using trace evaluations
Maintain proposed values using trace evaluations
Maintain transaction start permissions on call CALL TRANSACTION
Maintenance Status
Maintenance Status
Make sense in maintaining proposal values
Making the RESPAREA responsibility the organisational level
Managed Services
Managed Services
Managed Services
Manual authorizations
Manual authorizations
Map roles through organisational management
Mitigating GRC risks for SAP systems
Mitigating GRC risks for SAP systems
Module
Note the effect of user types on password rules
Note the effect of user types on password rules
Note the maintenance status of permissions in roles and their impact
Note the maintenance status of permissions in roles and their impact
Object S_BTCH_ADM (batch administration authorization)
Object S_BTCH_NAM and S_BTCH_NA1 (use of foreign users in Steps)
Object S_BTCH_NAM and S_BTCH_NA1 (use of foreign users in Steps)
Optimise trace analysis
Optimise trace analysis
Optimise trace analysis
Optimization of SAP licenses by analyzing the activities of your SAP users
Organisationally restrict table editing permissions
Organisationally restrict table editing permissions
Organisational allocation
Our offer
Our offer
Our services in the area of SAP authorizations
Our services in the area of SAP authorizations
Our services in the area of SAP authorizations
Perform Risk Analysis with the Critical Permissions Report
Perform upgrade rework for Y landscapes permission proposal values
Permissions and User Root Sets Evaluations
Permissions objects already included
Permissions objects already included
Permissions objects already included
Permissions with Maintenance Status Changed or Manual
Permissions with Maintenance Status Changed or Manual
Permissions with Maintenance Status Changed or Manual
Permissions with Maintenance Status Changed or Manual
Permissions with Maintenance Status Used
Permissions with Maintenance Status Used
Permissions with Maintenance Status Used
Permissions with status
Permission implementation
Preventing sprawl with the workload monitor
Preventing sprawl with the workload monitor
Preventing sprawl with the workload monitor
Preventing sprawl with the workload monitor
Prevent excessive permissions on HR reporting
PRGN_COMPRESS_TIMES
PRGN_COMPRESS_TIMES
PRGN_COMPRESS_TIMES
PROGRAM START IN BATCH
Protect Passwords
Protect Passwords
Protect Passwords
Query Data from Active Directory
Query Data from Active Directory
Query Data from a Local Table
Query Data from a Local Table
Query the Data from an HCM Personnel Root Record
Query the Data from an HCM Personnel Root Record
Read the old state and match with the new data
Rebuilding the authorization concept
Redesign of SAP® Authorizations
Redesign of SAP® Authorizations
Reference User
Reference User
Reset passwords using self service
Reset passwords using self service
Restrict Application Server Login
Restrict Application Server Login
Restrict Application Server Login
Retain the values of the permission trace to the role menu
Retain the values of the permission trace to the role menu
Retain the values of the permission trace to the role menu
RFC interfaces
Roles and permissions in SAP SuccessFactors often grow organically and become confusing
Roles and permissions in SAP SuccessFactors often grow organically and become confusing
Roles and permissions in SAP SuccessFactors often grow organically and become confusing
Role Management
Role Management
RSRFCCHK
RSRFCCHK
RSUSR003
RSUSR008_009_NEW
RSUSR008_009_NEW
RSUSR008_009_NEW
RSUSRAUTH
RSUSRAUTH
RSUSRAUTH
RS_ABAP_SOURCE_SCAN
RS_ABAP_SOURCE_SCAN
SAP Authorizations - A Common Perspective of Developers and Consultants
SAP Authorizations - A Common Perspective of Developers and Consultants
SAP authorizations: Recommendations for setting up, monitoring and controlling
SAP AUTHORIZATIONS: THE 7 MOST IMPORTANT REPORTS
SAP AUTHORIZATIONS: THE 7 MOST IMPORTANT REPORTS
SAP AUTHORIZATIONS: THE 7 MOST IMPORTANT REPORTS
SAP Authorization Trace - Simple Overview of Authorizations
SAP Authorization Trace - Simple Overview of Authorizations
SAP Data Analytics
SAP Data Analytics
SAP FICO Authorizations
SAP FICO Authorizations
SAP license optimization
SAP license optimization
SAP Security Automation
SAP Security Automation
SAP Security Automation
SAP Security Concepts
SAP Security Concepts
SAP systems: Control user authorizations with a concept
SAP S/4HANA: Analysis and simple adjustment of your authorizations
SAP S/4HANA: Analysis and simple adjustment of your authorizations
SAP S/4HANA® Launch Pack for Authorizations
SAP S/4HANA® Launch Pack for Authorizations
SAP S/4HANA® Launch Pack for Authorizations
SAP S/4HANA® migration audit
SAP S/4HANA® migration audit
SAP S/4HANA® migration audit
Schedule PFUD transaction on a regular basis
Schedule PFUD transaction on a regular basis
Search for user and password locks
Search for user and password locks
Security Automation for HR Authorizations
Security Automation for SAP Security Checks
Security in development systems
Security in development systems
Security in development systems
Security within the development system
Service User
Set Configuration Validation
Set up login locks securely
Set up permissions to access specific CO-PA measures
Set up permissions to access specific CO-PA measures
Set up permission to access Web Dynpro applications using S_START
Set up permission to access Web Dynpro applications using S_START
Set up permission to access Web Dynpro applications using S_START
SIVIS as a Service
SIVIS as a Service
Solution approaches for efficient authorizations
Solution approaches for efficient authorizations
Standard authorisation
Standard authorisation
Starting reports
Starting reports
Starting Web Dynpro ABAP applications
Structural authorizations
SU2X_CHECK_CONSISTENCY & SU24_AUTO_REPAIR
Sustainably protect your data treasures with the right authorization management
System Security
System Settings
System Settings
System Settings
System trace function ST01
System Users
System Users
System Users
System Users
Take advantage of roll transport feature improvements
Take advantage of roll transport feature improvements
Take advantage of roll transport feature improvements
Take advantage of roll transport feature improvements
Temporarily disable Central User Management
Temporarily disable Central User Management
Testing Permission
The Anatomy of SAP Authorization or Documentation on SAP Authorization Objects and Authorization Field Values
The SAP authorization concept
The SAP authorization concept
The SAP authorization concept
The SAP authorization concept
THE "TOP SEVEN"
Trace after missing permissions
Trace after missing permissions
Transactional and Native or Analytical Tiles in the FIORI Environment
Transactional and Native or Analytical Tiles in the FIORI Environment
Translating texts into permission roles
Translating texts into permission roles
Transports
Transports
Unclear objectives and lack of definition of own security standards
Unclear objectives and lack of definition of own security standards
Unclear responsibilities, especially between business and IT
Unclear responsibilities, especially between business and IT
Understanding SAP HANA Permissions Tests
Understanding SAP HANA Permissions Tests
Understanding SAP HANA Permissions Tests
User administration (transaction SU01)
User and authorization management
User and authorization management
User and authorization management
User group can be defined as required field
User Information System (SUIM)
User Information System SUIM
User Information System (SUIM)
User Information System (SUIM)
User Information System SUIM
User Interface Client Permissions
User Interface Client Permissions
User Interface Client Permissions
User Interface Client Permissions
User master data
Use AGS Security Services
Use AGS Security Services
Use application search in transaction SAIS_SEARCH_APPL
Use automatic synchronisation in central user management
Use automatic synchronisation in central user management
Use Central User Management change documents
Use Custom Permissions
Use Custom Permissions
Use Custom Permissions
Use Custom Permissions
Use Custom Permissions
Use SAP Code Vulnerability Analyser
Use SAP Code Vulnerability Analyser
Use SAP_NEW correctly
Use SAP_NEW correctly
Use SAP_NEW correctly
Use system recommendations to introduce security
Use system recommendations to introduce security
Use table editing authorization objects
Use table editing authorization objects
Use table editing authorization objects
Use the authorisation route to identify proposed values for customer developments
Use the authorisation route to identify proposed values for customer developments
Use the authorisation route to identify proposed values for customer developments
Use timestamp in transaction SU25
Use timestamp in transaction SU25
Use usage data for role definition
Use usage data for role definition
Using eCATT to maintain roles
Using suggestion values and how to upgrade
Using suggestion values and how to upgrade
Using suggestion values and how to upgrade
View system modifiability settings
View system modifiability settings
What are SAP authorizations?
What are the advantages of SAP authorizations?
What to do when the auditor comes - Part 1: Processes and documentation
What to do when the auditor comes - Part 2: Authorizations and parameters
What to do when the auditor comes - Part 2: Authorizations and parameters
What to do when the auditor comes - Part 2: Authorizations and parameters
WHY ACCESS CONTROL
WHY ACCESS CONTROL
Zurück zum Seiteninhalt
Um diese Website nutzen zu können, aktivieren Sie bitte JavaScript.