SAP Basis DBCO Database connections

Direkt zum Seiteninhalt
DBCO Database connections
SAPUI5 and Fiori
Of course, SAP administration is carried out by certified and experienced employees. This provides security for the SAP installations as well as for the sometimes quite complex update and upgrade projects.

SAP Basis is also known as module BC or application Basis. In this regard, SAP Basis refers to all transactions, programs and objects that control the functions of the overall system. This includes, among other things, user and authorization management as well as the configuration of interfaces via RFC.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.
Virtualization of your SAP system landscape
Reachable at any time: Your competent contact person is available at all times. If you operate SAP Basis Support in your own company, personnel bottlenecks may occur. If your SAP employees are absent due to illness or vacation, there may be no equivalent replacement available.

Cross-client tables can be modified. The control system of another, productive client can thus be undermined and undermined. Quite a lot of power! Did you also know that the SAP system provides a feature that deletes table change protocols (DBTA BLOG table) and that it is effective across all clients? If the table change logs have not been additionally archived via the BC_DBLOGS archiving object, traceability is no longer available. That way, every criminal act within your company can be beautifully covered up. Similarly, full access to batch management allows you to manage all background jobs in all clients with the permission. This allows you to delete old background jobs that have gone unauthorised. There are also some points to consider when managing print jobs. Typically, the following two SAP access permissions are enabled to protect print jobs: S_SPO_DEV (spooler device permissions) S_SPO_ACT (spooler actions). Why? Confidential information in print jobs is not protected against unauthorised disclosure. (Strictly) sensitive print jobs can be read unauthorised or redirected to external printers and printed out. Print jobs are unprotected unless additional SAP access permissions are enabled to protect print output. The print jobs are multi-tenant, which means that the authorisation award should also be well thought through at the point.

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

The database supplies the connected SAP applications with the required data, data tables or system control tables.

A note box in which data of all kinds can be quickly filed and retrieved. This is what Scribble Papers promises. At first, the program looks very spartan. But once a small structure is in place, you realise the great flexibility of this little helper.


It would also be possible to designate contact points (contact points) for upstream and downstream IT departments and external service providers and suppliers.
Zurück zum Seiteninhalt