SAP Basis Two ways to use Security Automation - SAP Stuff

Direkt zum Seiteninhalt
Two ways to use Security Automation
SXDA Data Transfer Workbench
SAP Basis experts ensure optimal integration of the SAP system into a company's individual IT landscape. Depending on the agreement, the team of experts takes care of the administration as well as the hosting and operation of the SAP system.

As a user of the group, you cannot see tabs either. Now select the applications / tabs to which the group should be accessed (with CTRL you can select several) and select the Grant button. Note: Select the Grant drop-down menu using the button and not the drop-down menu! Use the drop-down menu to determine if and how far users of the group you are currently editing can make CMC tab configurations to other groups / users! Select Grant for the desired tabs. If you still do not see any applications/tabs, it is because the group/user lacks the generic display right at the top level of the respective tab. To do this, go to the desired tab (in the example is the universe), select Manage —> Top-Level Security —> All Universes (the last point differs depending on the tab). Confirm the hint that appears and assign at least the following right for the groups you want: General —> General —> Objects View. Once this right is granted, the tab will also appear on the CMC home page. You can then see the tabs on the CMC home page.
Application of support patches, upgrades and installation of add-ons
Once you have met all the requirements described above, you can begin to prepare your system for processing digitally signed notes. To do this, the SAP Note with the number 2408073 must be recorded. This consists of a few steps for manual preparation, some automatically executable activities, and steps to rework the note. It is recommended not to change the file name after downloading. Note 2408073 has a file extension of "sar" and will first be unpacked with SAPCAR. There is a zip archive in it. The text file in it can be loaded into the Note Assistant with the SNOTE transaction via the Note upload. Once you have completed these steps, you can begin to install the note. The steps are detailed in the note itself and in a document attached to the note. Therefore, only a few points that need to be considered are highlighted below. When creating and clicking on Save the "CWBDS" object, a message may appear prompting you to select an object from the permitted namespace. Here the cursor can be placed in the object field and confirmed with Enter, then the query is made after a transport order. When creating the message texts in the "SCWN" message class, it is normal that after saving the changes several times (as many times as messages have been created) the question about the transport order must be confirmed. In addition, when creating the message texts, it should be noted that the texts provided in the tutorial attached to the note are available in English. If you are working on a German system, you should translate the texts into the German language when inserting them. The English texts can then be inserted as translations in the same window. To do this, select "Jump -> Translate". Conclusion It is a popular approach among hackers to use updates that are usually intended to fix bugs or increase security to inject malicious code into the system.

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.


Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page "www.sap-corner.de" you will find useful information on this topic.

Inheritance Hierarchy with Master Roles and Associated Roles If you have created multiple derived roles, a simple overview of all "related" roles can be convenient.

SAP Stuff
Zurück zum Seiteninhalt