SAP Basis Software installation - SAP Basis

Direkt zum Seiteninhalt
Software installation
Cooperation with internal support
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.

There are the following reasons that may lead to the termination of this step: CANNOT_GET_OBJECT_LIST: The Object List for a Support Package could not be found because the Support Package does not exist. CANNOT_CHECK_LOCKS: An error occurred while detecting the locks of an object in the queue. OBJECTS_LOCKED_IN_REQUESTS: Objects found in unreleased jobs. Release these jobs before you resume playing. SCHEDULE_RDDIMPDP In this step the transport daemon (programme RDDIMPDP) is planned. There are the following reasons that may lead to the termination of this step: CANNOT_SCHEDULE_RDDIMPDP: The RDDIMPDP job could not be scheduled. Enter the transaction SM37 (job selection), enter the following parameters, and select Next: Job Name RDDIMPDP Username Start by Event SAP_TRIGGER_RDDIMPDP Select the job that was cancelled and view the job log.
SAP Smart Forms
For the SAP basis and its employees, the change in self-understanding results in an attractive, responsible and demanding working environment. Technological diversity can be controlled and kept to the minimum necessary. This includes an overview of the existing interfaces and a controllable data flow with the associated guarantee of data security.

So-called Access Control Lists (ACL) offer a good possibility to secure your gateway in order to exclude unwanted external accesses to the database of the application server. With the help of the ACL files reginfo and secinfo an access control can be implemented, in which allowed as well as forbidden communication partners can be defined. The reginfo file controls the registration of external programs on the gateway, which means that rules can be defined that allow or prohibit programs. With the help of the file secinfo you can define which users are allowed to start an external program. To be able to use these files, you must set the parameters gw/reg_info and gw/sec_info (transaction RZ11). For more information, refer to SAP Note 1408081.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

A typical example is the TEST_IMPORT step.

Following the recommendation of dividing the SAP basis into an application-orientated and infrastructure-related SAP basis [A4], Figure 3 shows a possible presentation form.
SAP BASIS
Zurück zum Seiteninhalt