SAP Authorizations Note the effect of user types on password rules

Direkt zum Seiteninhalt
Note the effect of user types on password rules
Security within the development system
Thus, after evaluation, you can select all SAP hints with the status to implement and load directly into the Note Assistant (transaction SNOTE) of the connected system. This is only possible for a development system and if the SAP Solution Manager can use an appropriate RFC connection to the connected system. You should also consider the security advisories that apply to applications that are installed on your system but that you do not use productively. These vulnerabilities can also be used for an attack.

Single Role: Enables the automatic generation of an authorization profile. The role contains the authorization data and the logon menu for the user.
System Security
The SAP Note 1903323 provides a solution. The functionality is only provided via support packages for NetWeaver releases 7.31 and 7.40. This fix extends the naming conventions so that namespaces in the /XYZ/ format can be used up to a maximum of eight characters. In the development and creation of authorization objects, some functionalities of the SAP hint are extremely helpful, which we present in this tip.

You can use the BAdI SMIME_EMAIL of the SMIME extension spot and implement the CERTIFICATE_RETRIEVAL and CERTIFICATE_SELECTION methods according to your requirements. This BAdI is called whenever an encrypted e-mail is sent. An extension allows you to search for a valid certificate at run time (for example, the one with the longest validity) to the recipient's email address in a source you defined. In the default implementation, the BAdI searches for the certificate in the Trust Manager's address book. For details on the availability of BAdIs, see SAP Note 1835509.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.


You can then use the Permissions tab to express the authorization objects as usual.

To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.


In contrast to storing passwords in the form of hash values, the user ID and password are transmitted unencrypted during the login of the client to the application server.
Zurück zum Seiteninhalt