Planning / Implementation
Shift scheduling
It should be mentioned here that it only makes sense to access the tables by reading the SELECT statement to get a quick view of the results. Using the DBACOCKPIT, it is not possible to create entire table structures using Create Table. For such applications, SAP provides other, better options. Another important point is that once a user has the necessary permissions to use the transaction DBACOCKPIT, it can potentially (with appropriate permissions on the tables) access the entire SAP system. For example, a query can be used to read the entire user table. Therefore, the transaction should always be treated with caution and only awarded to administrators. DBACOCKPIT handles the call control permissions similar to the SE16 / SE16N transaction. When the table is called, the S_TABU_DIS or S_TABU_NAM permission object is checked with a specific activity. This means that only the tables or table permission groups for which the corresponding values in the aforementioned permission objects are assigned can be accessed. You can read more about assigning permissions to individual tables here. In addition, you can save SQL statements that you run once, and run them again at any time to recognise changes in the result set without having to reformulate the SQL statement each time. The editor also allows you to start the query for SQL statements in the background. The result is obtained by calling the transaction SM37, in which the result is output in a spool file.
Technical developments are progressing at high speed. Thus, the term "blockchain" is not unique to digital currencies. Instead, there is talk of a technology that will disrupt existing products, services, and even business models. In order to better assess the potential and impact of blockchain technology, various companies from different technologies and, in particular, financial sectors have joined forces in consortia in recent years: The R3 Consortium, which is primarily a consortium of about 80 financial sector companies (UBS, Credit Suisse, Deutsche Bank, Commerzbank, ...). The IoT Consortium, which includes Bosch Ltd, Cisco Systems Inc, is investigating how blockchain technology can be used to secure and improve IoT networks. More than 120 financial, banking, IoT and industrial companies have joined the Hyperledger (Enterprise Ethereum Alliance) consortium. Enterprise Ethereum Alliance with about 500 startups, companies and academic institutions from a wide range of fields. Read more in my next blog post ....
Operation of your ERP landscape on SAP on HANA
The SAP Basis is responsible for the smooth operation of the programmes in the SAP system. It acts as an operating system for R/3 and subsequent releases including S/4HANA. Each operating system provides an environment in which programmes can run, such as MS Office on Microsoft Windows. Likewise, the SAP base system with the NetWeaver and HANA platform offers an environment in which the SAP programmes can run. In this context, the NetWeaver platform itself relies on server operating systems such as Windows and Linux.
Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.
In practice, it is quite possible that the target specifications defined in the security concept do not match the current actual status. Therefore, especially with regard to SAP security, it must always be checked whether the necessary SAP basic settings also correspond to the minimum level. Although a manual check is possible, it is very time-consuming because the necessary regularizations have to be read, interpreted and technically implemented. The Security Architect - part of the Xiting Authorizations Management Suite (XAMS) software solution developed by Xiting - offers you the possibility to precisely examine the current status of the SAP Basis settings with the help of the integrated check mode, whereby it is also possible to check several systems via RFC, starting from a central system. The scope of the check of system settings and system security includes not only the SAP Basis settings presented here, but also other SAP Basis settings. The scope of the check mode can be extended by self-defined check IDs.
"Shortcut for SAP Systems" makes it easier and quicker to complete a number of SAP basis tasks.
HANA optimization makes your own programs really fast.
The freeware Scribble Papers puts an end to the confusing paper chaos. The tool is also suitable for storing, structuring and quickly finding text documents and text snippets of all kinds in addition to notes.
However, since this is desired, the access control lists must be gradually expanded to include each programme required.