SAP Basis Implement notes - NW Admin

Direkt zum Seiteninhalt
Implement notes
Scheduling background jobs, job monitoring, job deletion, etc
Customers with such a case regularly contact us. Creating a Permission Concept from the ground up is often a time-consuming task. Furthermore, the know-how, which aspects should be dealt with in an authorisation concept and how the corresponding processes can look practical and at the same time audit-proof is often lacking. Our solution: tool-based generation of an individual, written authorisation concept In this situation, we have recommended to our customers the tool-based generation of a written authorisation concept directly from the SAP system. We use the XAMS Security Architect tool, with which we have had good experiences. This includes a template for a revision-proof and comprehensible, written authorisation concept. It includes established best practices for role and entitlement management. The template covers all relevant areas in a permission concept. The included text of the authorisation concept is completely customisable, so that the concept can be tailored to your situation without creating a permission concept from scratch. Dynamically update the written authorisation concept One of the biggest challenges after the development of an authorisation concept is to keep it up to date in the long term and to measure the sustainable implementation in the system. This is achieved by integrating live data such as configuration settings and defined rules directly from the connected system. For example, lists of existing roles or user groups and tables are read from the system each time the document is generated and updated in the permission concept. The following screenshot shows an example of what the appearance in the concept document might look like. Automatically check and monitor compliance with the concept To check compliance with the concept, the XAMS Security Architect includes extensive inspection tools. These cover the rules formulated in the concept and are suitable for measuring the extent to which the reality in the system meets the requirements formulated in the concept.

If the user assignment of several transactions is to be verified, where it is not clear whether all transactions have been maintained in the menu of roles, the use of the transaction SE16N is always appropriate. Here you can also see the transactions that were assigned to a role only by the S_TCODE permission object. The result also shows which transaction is included in which role. What experience have you had in identifying specific transactions with user assignment? Do you know of any other ways to solve this problem? About your experiences and.
How to create a parameter transaction for the SM30
The database layer is where all of a company's data is stored. In essence, it consists of a database management system (DBMS for short) and the data itself.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.


Every SAP Basis system must be controlled and managed by an administrator. The person responsible ensures smooth operation of the system. This can be an internal administrator, or can be handed over to external service providers.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

Trust is good, control is better In order to avoid employees being entitled beyond your area of competence, user data and permissions must be continuously adjusted to the current requirements.

So much information... how can you keep it so that you can find it again when you need it? That's what Scribble Papers is great for.

Similarly, a bot can create incidents or notifications when something goes wrong.
NW BASIS
Zurück zum Seiteninhalt