SAP Authorizations Use system recommendations to introduce security - SAP Basis

Direkt zum Seiteninhalt
Use system recommendations to introduce security
Authorization tools - advantages and limitations
Login with user and password of another application (such as an AD or portal) In this case, the Web application must be able to obtain a unique SAP user ID to the login data. You should choose an application where the user does not easily forget his password.

If you want to know more about SAP authorizations, visit the website www.sap-corner.de.

So much information... how can you keep it so that you can find it again when you need it? Scribble Papers is a "note box" that makes this very easy.

The first step to eliminating sprawl in permissions is to prevent it. To do this, administrators should obtain an overview and the assigned authorizations should be checked regularly. This helps to identify problems and incorrectly assigned authorizations at an early stage. The workload monitor can help here. This shows which authorizations users are actually using. The use of authorizations can be analyzed selectively and exported to tables. This also helps to improve existing roles and to create new roles for the authorization model in SAP.
In the transaction, select SU10 by login data of users
Object Privileges: Object Privileges are SQL permissions that control access to and modification of database objects (as a whole). The type of object (table, view, procedure) determines which database operations can be authorised. Database operations include SELECT, UPDATE, ALTER, DROP, and DEBUG.

System Privileges (Database System) permissions: System Privileges are SQL permissions that control administrative actions throughout the database. Such actions include creating a (database) schema (CREATE SCHEMA), creating and modifying roles (ROLE ADMIN), creating and deleting a user (USER ADMIN), or running a database backup (BACKUP ADMIN).

The possibility of assigning authorizations during the go-live can be additionally secured by using "Shortcut for SAP systems".

Another danger is that users will experiment with their authorizations and cause damage that can be avoided by having a clean authorization structure.

These then correspond to your internal and external security guidelines.
SAP BASIS
Zurück zum Seiteninhalt