SAP Basis The basics of Basis Administration - SAP Basis

Direkt zum Seiteninhalt
The basics of Basis Administration
SCOT SAPconnect - Administration
In addition, the applications prepare the data in such a way that the user can visually capture it via the presentation layer. Conversely, the application server transfers all data that a user enters via the presentation layer to the underlying database.

Another important example is the reading permission for TemSe objects. The temporary files are often forgotten, because it is often not considered that cached (strictly) sensitive data, which is intended for only one user (owner), can be viewed by another user without permission - and across clients. The examples mentioned show us how important it is to carefully assign permissions for client-independent transactions. Download Transaction tables The transactions that enable the examples above, including certain expressions of the associated permission objects and our recommendations for them, can be found in the file "Critical cross-client permissions" for download. Other client-independent transactions are located in the Cross Clients TCODES file. The criticality of these transactions should be assessed according to the context. I recommend always being careful and keeping these transactions in mind.
What does SAP Basis Support do?
The application servers provide the services for running SAP applications. In practice, companies usually decide to use a separate application server for each application.

Customers with such a case regularly contact us. Creating a Permission Concept from the ground up is often a time-consuming task. Furthermore, the know-how, which aspects should be dealt with in an authorisation concept and how the corresponding processes can look practical and at the same time audit-proof is often lacking. Our solution: tool-based generation of an individual, written authorisation concept In this situation, we have recommended to our customers the tool-based generation of a written authorisation concept directly from the SAP system. We use the XAMS Security Architect tool, with which we have had good experiences. This includes a template for a revision-proof and comprehensible, written authorisation concept. It includes established best practices for role and entitlement management. The template covers all relevant areas in a permission concept. The included text of the authorisation concept is completely customisable, so that the concept can be tailored to your situation without creating a permission concept from scratch. Dynamically update the written authorisation concept One of the biggest challenges after the development of an authorisation concept is to keep it up to date in the long term and to measure the sustainable implementation in the system. This is achieved by integrating live data such as configuration settings and defined rules directly from the connected system. For example, lists of existing roles or user groups and tables are read from the system each time the document is generated and updated in the permission concept. The following screenshot shows an example of what the appearance in the concept document might look like. Automatically check and monitor compliance with the concept To check compliance with the concept, the XAMS Security Architect includes extensive inspection tools. These cover the rules formulated in the concept and are suitable for measuring the extent to which the reality in the system meets the requirements formulated in the concept.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

BY ESTABLISHING A NEW ROLE CONCEPT AND BUILDING NEW ROLES, THE SAP basis HAS THE SKILLS NECESSARY TO CARRY OUT NEW TASKS AND THEMES, AS WELL AS TO OPERATE NEW TECHNOLOGY AND SERVICE FORMS.

If you have added attachments, they will also be searched for the keyword.
SAP BASIS
Zurück zum Seiteninhalt