SAP Authorizations What are SAP authorizations? - SAP Stuff

Direkt zum Seiteninhalt
What are SAP authorizations?
AUTHORIZATIONS IN SAP SYSTEMS
You can set up a nightly background job to match the certificates with your customer's own programme. This requires that the certificates can be obtained through an SAP programme.

Now the SAP system is basically able to encrypt emails. However, the system still lacks the recipient's public key. You can manage the required public key information in the Trust Manager's address book. You can find the address book in the Transaction STRUST menu under Certificate > Address Book. Here you can import individual certificates by selecting the corresponding certificate in Certificate > Import Certificate. To get the certificates for all relevant users in this address book via a mass import, use the example programme Z_IMPORT_CERTIFICATES appended in SAP Note 1750161 as a template for a custom programme.
Displaying sensitive data
How do I make an authorization trace on a user (STAUTHTRACE)? With the authorization trace you can record which authorization objects are used by a user. This helps, for example, in the creation of suitable roles: - Call the transaction STAUTHTRACE - Specify the desired user and start the trace - Let the user call his transaction - Stop the trace (Important, do not forget!) - Evaluate the results.

"Shortcut for SAP systems" is a tool that enables the assignment of authorizations even if the IdM system fails.

The website "www.sap-corner.de" offers a lot of useful information about SAP authorizations.

A careless handling of the permissions with sensitive employee data can go quite nicely in the pants.

SAP Stuff
Zurück zum Seiteninhalt