SAP Basis SAP SM37: How to monitor a background job?

Direkt zum Seiteninhalt
SAP SM37: How to monitor a background job?
Technological basis for SAP Fiori (SAP Gateway)
Within this step, a pricing strategy is chosen. The strategy chosen must be based on the value for money. The selection shall also be justified. The price of the service will continue to be determined, as will formal decisions on clearing models and discounts. This step is less important for the SAP basis. While it is necessary to set a price for the IT products to be defined in terms of appreciation and offsetting, it does not require an elaborate pricing system. STEP 8: MARKET COMMUNICATION The step of market communication describes the way in which the respective service is advertised and how it is to be communicated with customers in this regard. It's about the communication tools that are planned, which describe the place of communication, the communication tools that describe what to advertise, and the content. These are usually derived from the target group to be applied for. For the SAP basis, the content is an essential feature of the market communication. That is, depending on the target group, information must be created and communicated. STEP 9: INTERNAL COMMUNICATION Internal communication describes how the above-mentioned aspects can also be successfully communicated internally, i.e. in the direction of one's employees.

An SAP HANA system lives on applications. When you develop these applications, you should think about securing them early. Using HTTPS instead of HTTP is one of the basics. In addition, you ensure secure authentication and implement a Secure Software Development Lifecycle to ensure backup in your own developments. In your applications, you better start to check them for risks early on and run this backup process regularly. You can analyse and restrict access to source code later. Create a risk register and address security vulnerabilities in a risk-based manner. The later you discover a risk, the more expensive the fix will be. Further information on SAP Security in addition to the article can be found here. Do you have any further questions or suggestions concerning this topic? Would you like us to go further on the subject? I look forward to your feedback!

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.
Change and Release Management
A secure SAP system does not only include a good role concept. It is also necessary to check whether a user should (still) have a specific role. Regular verification of role assignment is called recertification. In this blog post, I'd like to introduce you to the need for recertifications and our own tool, EasyReCert. The need for recertification - scenarios: Example 1: The "apprentice problem" Imagine the following scenario: A new employee (e.g. apprenticeship or trainee) will go through various departments as part of his or her training and will work on various projects. Of course, an SAP User will be made available to your employee right at the beginning, which is equipped with appropriate roles. As each project and department passes, the employee repeatedly needs new permissions to meet the requirements. After the employee has successfully completed his or her induction and is now in a permanent position, he or she still has permissions that are not necessary to perform his or her duties. This violates the principle of "last privilede" and represents a potential security risk for your company. Example 2: The change of department The change of department is one scenario that probably occurs in every company. If a change of department does not automatically involve a complete reallocation of roles and the employee simply takes his old permissions with him, critical combinations of permissions can occur very quickly. For example, an employee who has permissions in accounts payable and accounts receivable violates the SoD ("Segregation of Duties") principle and poses a potential security risk to your company. Recertification as part of a revision: The two examples above show that a regular review of role allocation identifies potential security risks for your business and can be addressed.

SAP Basis Administration Batch Control Job Control A large proportion of batch jobs run at night, while IT systems are available for dialog and online applications during the day. Meanwhile, web applications demand computer capacity around the clock. Even dialog systems are no longer in operation only from 8 a.m. to 6 p.m., but between 7 a.m. and 10 p.m. or longer. The time window for administration tasks is increasingly shifting toward transaction processing. This leaves less and less time for mission-critical batches, which can lead to disruptions and terminations. Whereas batch processing used to be a mainframe domain, companies today usually have to control background processing in heterogeneous operating system environments and client-server applications. For this reason, cross-platform, integration-capable job schedulers that can respond to unplanned events are in demand.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

Back then, SAP installation manuals were real tomes with hundreds of pages that often went around in circles and were anything but easy to understand....

The freeware Scribble Papers puts an end to the confusing paper chaos. The tool is also suitable for storing, structuring and quickly finding text documents and text snippets of all kinds in addition to notes.


You should still be aware of the SAP ERP environment to address this security risk.
Zurück zum Seiteninhalt