SAP Basis What happens if an SAP job terminates unexpectedly? - SAP Basis

Direkt zum Seiteninhalt
What happens if an SAP job terminates unexpectedly?
Attach Transport Order to Queue
There is no way around containers, and even SAP will soon have to reorient itself here and allow the NetWeaver stack to be run in containers. There are many indications that Kubernetes will win the battle for supremacy among container management tools. SAP has also already invested in Gardener and is also intensifying its partnerships with IBM and Red Hat Openshift.

The Security Audit Log (SAL) is one of the most important elements when it comes to security in your SAP landscape. With SAL critical and security relevant activities in SAP systems can be recorded and evaluated. The settings in SAL are relevant for secure continuous operation.
Creating users, assigning roles, locking and unlocking users, etc
SAP S/4HANA is short for Suite 4 HANA. SAP S/4HANA is ERP software that is the successor to the previous core product ... View full definition.

Especially after security incidents it may be necessary to find out which (technical) users have logged in at which time. The USR02 table provides a first entry point. In the TRDAT column you can find the last login date for the user you want. However, a history of previous applications is not found in this table. In such cases, the Security Auditlog or SAL helps. Preparation In order to access the desired data, it must also have been saved previously. In the Security Auditlog, you can use various filters to determine which users are logged on which client and which information. The Security Auditlog stores, depending on configuration, logins, RFC calls, and other actions for specific users. You can make these settings in the SM19 transaction. Note: Logging user activity must be aware of the users concerned! Configure the SAL only for technical users or in consultation with users / works council / etc. It can be seen there among other things when the SAL was activated and last edited (1). You can also select the various filters (2), activate the filters individually (3), specify clients and users (4) and specify which activities are logged (5). Static configuration in the SM19 Under the Dynamic Configuration you can also see if SAL is currently active for the system. Determine the status of the SAL Evaluation of the SAL If the Security Audit Log is active, switch to the SM20 evaluation of the Security Audit Log. Select the desired user and client and the appropriate time window. The option Dialogues login is sufficient for the login. Then, restart the AuditLog analysis. Start evaluation You will get an overview of the user's login to the selected client of the system.

The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.

However, the patterns of security vulnerabilities in ABAP code differ from those in Java stacks or Windows programs.

Do you already have an emergency user concept in use or would like to introduce one? I'm happy if you share your experience with me! You can leave me a comment or contact me by e-mail.
SAP BASIS
Zurück zum Seiteninhalt