SAP Basis Installation/upgrade of SAP systems based on HANA Platform - SAP Basis

Direkt zum Seiteninhalt
Installation/upgrade of SAP systems based on HANA Platform
Web Dispatcher
Capacity must be built to provide the necessary space for pilot and research projects and to meet the increased demands. This can be done, among other things, by increasing the previous resources or/ and by measures of standardisation & automation as well as "cloudability", outsourcing & outtasking.

In the ERP environment, SAP has created a separate module for each business task area over the course of time. Companies have the option of putting together a suitable system from these modules, depending on their individual needs.
REDUCTION AND AVOIDANCE OF ORGANISATIONAL INCENTIVES
It should be mentioned here that it only makes sense to access the tables by reading the SELECT statement to get a quick view of the results. Using the DBACOCKPIT, it is not possible to create entire table structures using Create Table. For such applications, SAP provides other, better options. Another important point is that once a user has the necessary permissions to use the transaction DBACOCKPIT, it can potentially (with appropriate permissions on the tables) access the entire SAP system. For example, a query can be used to read the entire user table. Therefore, the transaction should always be treated with caution and only awarded to administrators. DBACOCKPIT handles the call control permissions similar to the SE16 / SE16N transaction. When the table is called, the S_TABU_DIS or S_TABU_NAM permission object is checked with a specific activity. This means that only the tables or table permission groups for which the corresponding values in the aforementioned permission objects are assigned can be accessed. You can read more about assigning permissions to individual tables here. In addition, you can save SQL statements that you run once, and run them again at any time to recognise changes in the result set without having to reformulate the SQL statement each time. The editor also allows you to start the query for SQL statements in the background. The result is obtained by calling the transaction SM37, in which the result is output in a spool file.

A user name without a restricted character set can be a security risk. Therefore, it is advisable that you restrict the character set of the user ID. In this article you will learn where the dangers lie if you do not limit the user ID. I also explain how to eliminate this security risk.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

This role must be filled more and more often.

New risks in SAP HANA: In addition to the known risks, there are also new risks from the use of SAP HANA.
SAP BASIS
Zurück zum Seiteninhalt