SAP Basis BDLS Conversion of logical system names - NW Admin

Direkt zum Seiteninhalt
BDLS Conversion of logical system names
Structured work
In this article on SAP Security Automation I would like to take a look at the future of automated processes in the SAP Security area. For many companies, the topic of security automation still offers a lot of potential in terms of time savings and process optimisation. Our daily work environment offers numerous tasks that could be handled excellently automatically. For this reason, in this article I present two of the possibilities that already exist in the broad area of security automation. Security Automation via SAP Security Check The first option of Security Automation, which I want to introduce here, is the automatic verification of the existing permissions. Have you ever wondered who has critical permissions in your SAP system? And have you ever tried to do this by hand? Depending on the level of expertise and experience of the privilege administrator, this is a time-consuming work. If an audit is also announced and the SAP system is to be checked for critical permissions and segregation of duties, then it is very difficult to meet all requirements and secure the eligibility landscape in this respect. For this reason, various vendors provide solutions to automate the verification of the permission system with regard to critical permissions and segregation of duties using tool support. This allows permission administrators to use their valuable time to correct the errors rather than just looking for them. For example, we use a tool that runs through the verification of over 250 rules. We then get an evaluation of which rules are violated and which points are correct. A simple example of such rules is the use of the SAP_ALL profile. Another would be to grant the jump permission in debugging (S_DEVELOP permission object with the ACTVT = 02 field). These are two relatively simple examples of Security Check tools' rulebook. In addition, queries are also made, which are located in the field of Segregation of Duties. Using this tool allowed us to move from manual validation of critical permissions to an automatic process.

Better technologies have expanded the role of SAP Basis Administrators, paralleling the IT industry as a whole. It's no longer enough to keep the system running and performing well. An SAP HANA Basis Administrator also plays a role in cost control, IT strategy and even business policy.
SLICENSE SAP License Management
In addition to purely administrative tasks, SAP administrators are also responsible for communication. They cooperate with the company's internal support departments and work with them on ways to help users solve and avoid any problems and pitfalls when using SAP solutions. For internal purposes, the SAP administrator also prepares documentation and uses it to search for errors, the cause of which he or she tries to combat. If necessary, he or she communicates with decision-makers in the company in order to be able to implement improvements, adjustments and optimizations with regard to the SAP software.

On www.sap-corner.de you will also find useful information about SAP basis.


Job scheduling: your system needs to run various automatic background jobs that consume resources. Your administrator must carefully schedule these tasks when user demand is low so they don't impact performance.

"Shortcut for SAP Systems" makes it easier and quicker to complete a number of SAP basis tasks.

The position of SAP Basis consultant is often combined with the position of SAP Basis administrator.

So much information... how can you keep it so that you can find it again when you need it? That's what Scribble Papers is great for.

If the *.ATT files are present, run only RSEPSUPL in the target system.
NW BASIS
Zurück zum Seiteninhalt