SAP Authorizations SAP Security Concepts - SAP Stuff

Direkt zum Seiteninhalt
SAP Security Concepts
What to do when the auditor comes - Part 1: Processes and documentation
Repair defective field list in SU24 suggestion values: This function verifies that all the authorization objects used in the permission proposals are consistent, that is, fit to the authorization object definitions from transaction SU21. If there are no permission fields or if there are too many entries, these data will be corrected in the proposal values.

Versions are the change documents within the development environment, for example, for changes to ABAP source code or the technical properties of tables. This authorization should only be assigned to an emergency user.
Set up login locks securely
Access options and authorizations are defined and controlled in the SAP authorization concept. How secure business data is in SAP depends largely on the assignment of authorizations and access options for a company's users.

For the assignment of existing roles, regular authorization workflows require a certain minimum of turnaround time, and not every approver is available at every go-live. With "Shortcut for SAP systems" you have options to assign urgently needed authorizations anyway and to additionally secure your go-live.

If you want to know more about SAP authorizations, visit the website "www.sap-corner.de".

Here you can select the user you want to analyse in the corresponding field.

SAP Stuff
Zurück zum Seiteninhalt