SAP Authorizations Using eCATT to maintain roles - SAP Stuff

Direkt zum Seiteninhalt
Using eCATT to maintain roles
Unclear objectives and lack of definition of own security standards
It takes too long to read out the User and Permissions Management change notes? With a good archiving concept, you can improve performance. User and Permissions Management applications write change documents that increase significantly over time and can cause long wait times to read them. To reduce waiting times, you should archive the documents and set a logical index for key change documents. For this, however, you need a comprehensive overview of the storage locations and also of the evaluation possibilities and archiving scenarios. In the following we will show you how you can optimise the change document management of the user and permission management.

Every company knows the situation, every year again the auditor announces himself to perform the annual audit and to certify the balance sheet at the end of the audit. In the first part on this topic, the focus was on the relevant processes and documentation. In this part, the concentration is on a deeper level, namely directly in the SAP® system. The specifications for this should already be written down in the SAP® authorization concept.
Analyze user buffer SU56
After all authorizations are maintained, the role must be saved and generated and a user comparison must be performed. However, this should not be a topic here in the article. This can also be done with the transaction PFUD (see comments to the article "SAP BC: Empty user buffer" :-).

Authorizations can also be assigned via "Shortcut for SAP systems".

At "www.sap-corner.de" you will also find a lot of useful information on the subject of SAP authorizations.

You record the execution of a transaction and get the variables of the text blocks (technical role name, role description, etc.).

SAP Stuff
Zurück zum Seiteninhalt