SAP Authorizations Hash values of user passwords

Direkt zum Seiteninhalt
Hash values of user passwords
SAP Authorizations - A Common Perspective of Developers and Consultants
You cannot increase the retention time afterwards; Therefore, you should adjust the configuration in good time before starting a project. In addition, you should change the settings of the stat/rfcrec and stat/rfc/distinct profile parameters. For example, you should increase the value of stat/rfcrec to 30, and stat/rfc/distinct should be set to 1. This improves the completeness of the recorded RFC usage data. For details on the technical improvements, see SAP Note 1964997.

CREATE_EMAIL_CONTENT: The example implementation of this method generates the e-mail content. The user ID, the relevant system and the initial password are listed for each user. When the method is called in the Central User Management (ZBV), all initial passwords associated with the system in which the password was reset are listed. You should adapt the content of the e-mail to your requirements.
Security Automation for HR Authorizations
A typical application arises when a new SAP user is requested. The data owner now checks whether the person making the request and the person to be authorized are at all authorized to do so, what data would be affected, whether an SAP user already exists to whom new roles can be assigned and old ones revoked, whether data access can be limited in time, and so on.

You can adjust these evaluation methods in the table T77AW or in the transaction OOAW. To do this, select the respective evaluation path by selecting it, and click on the evaluation path (individual maintenance) in the menu on the left. The table that appears defines the relationships between the objects. For SAP CRM only the objects Organisational Unit (O), Headquarters (S), Central Person (CP) and User (US) play a role. For simplicity, you can now copy the lines that use the Person (P) object. Enter a new number here and replace the object P with the object CP.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

The website www.sap-corner.de offers many useful information about SAP basis.


Encryption is intended to ensure the confidentiality of the data, i.e. that only the recipient of the e-mail should be able to read it.

So much information... how can you keep it so that you can find it again when you need it? That's what Scribble Papers is great for.


Therefore, it is necessary to test the use of P_ABAP in individual cases and to use the existing limitations.
Zurück zum Seiteninhalt