SAP Basis Aufbau der SAP Basis - SAP Stuff

Direkt zum Seiteninhalt
Aufbau der SAP Basis
Typical tools in the SAP Basis environment include:
In order to demonstrate the necessary open spaces and capacities and also to demonstrate the innovative power of the SAP basis, regular reporting to the CIO or the management is recommended. If a product or technology is successfully evaluated, this can also be published as a success story within the framework of SAPBasis marketing (see chapter 7.4 in the Master's thesis) within the company.

If regulations for the standardisation of SAP systems or tasks and procedures are in place, they must also be consistently complied with and their compliance must also be verified. In case of non-compliance, for example due to project influences or technological problems, the exception must be returned to the standard in a timely manner. Resources must be made available for this.
SAPUI5 and Fiori
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.

For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.


Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page "www.sap-corner.de" you will find useful information on this topic.

This article focuses on the use of ACL files such as secinfo and reginfo files.

SAP Stuff
Zurück zum Seiteninhalt