SAP Authorizations Identify Executable Transaction Codes - SAP Stuff

Direkt zum Seiteninhalt
Identify Executable Transaction Codes
Which challenges cannot be solved with authorization tools alone?
Excel-based tools that do not use the PFCG transaction in the background, like eCATT, function almost exclusively on the one-way principle: Simultaneous maintenance of roles in the PFCG transaction is no longer possible, and changes there are overwritten by the tool. This means that all permission administrators must work exclusively with the new solution.

Look closely at the security advisory so that you can identify the affected programmes or functions and schedule appropriate application tests. Use a test implementation in the SNOTE transaction to identify additional SAP hints that are required for a security advisory and may also contain functional changes.
Prevent excessive permissions on HR reporting
The SAP NetWeaver Application Server ABAP 7.31 changed the way the transaction SU25 works, especially from step 2a to the automatic suggestion value matching with SAP values. Now, this compares which records have been updated using time stamps. This makes it possible to run Step 2a separately for software components installed afterwards. Another advantage is that the objects to be edited can be better identified due to the time stamp. Before SAP NetWeaver 7.31, the applications to be matched for step 2a have been registered with their base release versions, which you can see in the USOB_MOD or TCODE_MOD tables.

Authorizations can also be assigned via "Shortcut for SAP systems".

You can also find some useful tips from practice on the subject of SAP authorizations on the page "www.sap-corner.de".

You find a specific customising table and you don't find it.

SAP Stuff
Zurück zum Seiteninhalt