SAP Basis OUTTASKING COMPLEX AND RATHER RARE TASKS

Direkt zum Seiteninhalt
OUTTASKING COMPLEX AND RATHER RARE TASKS
OAAD Document search in archive
Capacity must be built to provide the necessary space for pilot and research projects and to meet the increased demands. This can be done, among other things, by increasing the previous resources or/ and by measures of standardisation & automation as well as "cloudability", outsourcing & outtasking.

There are several ways to introduce and operate new applications. As a company you have the choice between internal realisation and operation, outsourcing, cloud computing and so-called outtasking. In deciding on one of the above concepts, the SAP basis must be included for the evaluation of various technological and operational aspects, which offers the possibility to develop a sound decision. This decision has a significant impact on the future operation of SAP and the associated operating and maintenance costs. The recommendations listed here are intended to help you decide on other forms of service. Information on the recommendation can be found in the Master's thesis in chapters 7.8 and 9.6.

Some useful tips about SAP basis can be found on www.sap-corner.de.
The Client Control
This makes the technical user the dialogue user and a login in the SAP system is unrestricted. So Johannes logs in with the known password of the RFC user in the production system. Thanks to very extensive permissions, it now has access to all sorts of critical tables, transactions, and programmes in production. With the identity of the RFC user Johannes starts with the technical compromise of the production system... RFC Security: All invented - or everyday threat? Whether a simple trim, altered biometric properties or an encapsulated technical user in the SAP system: the basis of the compromise is the same. A person uses a different identity to gain access and permissions to protected areas. Moreover, the evil in all three stories could have been prevented by pro-activity. When was the last time you thought about the security of your RFC interfaces? Can you say with certainty that all your technical RFC users only have the permissions they actually need? And do you know who exactly knows the passwords of these users? Can you 100% rule out that not now in this moment an SAP user with a false identity infiltrates your production systems? Change now: It's about pro activity! But before you start now and start looking for the "identity converter" (which I really do not recommend!), I suggest that you take root of evil and proactively strengthen your RFC security. So if you want to find out more, I have the following 3 tips for you: 1) Our e-book about SAP RFC interfaces 2) Clean up our free webinar about RFC interfaces 3) Blog post about our approach to optimising RFC interfaces As always, I look forward to your feedback and comments directly below these lines!

In some cases, the term SAP Basis is also equated with the administration of an SAP system, i.e. with a task description. In this case, it refers to the management and control of SAP systems via various administration and monitoring tools.

"Shortcut for SAP Systems" makes many tasks in the area of the SAP basis much easier.

With SAP HANA, you can achieve huge performance increases over traditional databases that were previously unthinkable.

To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.


After your user has the necessary permissions for the SQL Editor, perform the following steps: Call the DBACOCKPIT transaction.
Zurück zum Seiteninhalt