SAP Authorizations Use Central User Management change documents - SAP Basis

Direkt zum Seiteninhalt
Use Central User Management change documents
Maintain generated profile names in complex system landscapes
However, a full SAP security audit does not end here. In addition, the auditor examines whether the four important concepts of SAP Security, namely the data ownership concept, the proprietary development concept, the authorization concept and the emergency user concept, meet the requirements. Each of them should represent a fully formulated document that, on the one hand, contains all the target specifications for the respective topic and, on the other hand, is consistent with the actual state found during the audit.

The website www.sap-corner.de offers a lot of useful information about SAP authorizations.

To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.

Both solutions offer you the added value of centralised reporting of existing users, newly created users, and role assignments. You can also extend the integrated workflows of both solutions to HANA permission applications. This enables you to use the risk analysis of the SAP Access Control solution also in relation to critical HANA permissions.
Integrate S_TABU_NAM into a Permission Concept
You can disable this new behaviour for the SAP_ALL profile by setting the customising switch ADD_S_RFCACL to the value YES in the table PRGN_CUST. If the ADD_S_RFCACL entry is YES, SAP_ALL still contains the total permissions for the S_RFCACL authorization object.

On the topic of SAP authorizations and SAP S/4HANA, I can recommend the SAP online course by Tobias Harmes as blended learning from Espresso Tutorials for SAP administrators, ABAP developers and people who are currently or will be dealing with SAP authorizations. The online course covers the following topics: - Introduction to the course - Why are SAP authorizations actually important? - How do SAP authorizations work technically? - Developing and maintaining roles - SAP Fiori authorizations/tile authorizations in S/4HANA - Developing authorization checks.

The possibility of assigning authorizations during the go-live can be additionally secured by using "Shortcut for SAP systems".

Make sure that this vulnerability does not exist in your system landscape.

Let's look at the effects of different programming on a simplified example.
SAP BASIS
Zurück zum Seiteninhalt