Root cause analysis
You might be interested in:
Presentation layer: The presentation layer is the top layer of the R/3 SAP Basis system and includes communication with the user. Here, the data is graphically prepared for the user on the terminal device by means of software components from the application programs of the application layer. The presentation layer represents the interface to the user (SAP GUI).
In many companies, the SAP system is the linchpin of everyday business. To ensure that the system is available at all times, an SAP Basis team ensures its smooth operation.
Support for adjustments and changes to the systems
A secure SAP system does not only include a good role concept. It is also necessary to check whether a user should (still) have a specific role. Regular verification of role assignment is called recertification. In this blog post, I'd like to introduce you to the need for recertifications and our own tool, EasyReCert. The need for recertification - scenarios: Example 1: The "apprentice problem" Imagine the following scenario: A new employee (e.g. apprenticeship or trainee) will go through various departments as part of his or her training and will work on various projects. Of course, an SAP User will be made available to your employee right at the beginning, which is equipped with appropriate roles. As each project and department passes, the employee repeatedly needs new permissions to meet the requirements. After the employee has successfully completed his or her induction and is now in a permanent position, he or she still has permissions that are not necessary to perform his or her duties. This violates the principle of "last privilede" and represents a potential security risk for your company. Example 2: The change of department The change of department is one scenario that probably occurs in every company. If a change of department does not automatically involve a complete reallocation of roles and the employee simply takes his old permissions with him, critical combinations of permissions can occur very quickly. For example, an employee who has permissions in accounts payable and accounts receivable violates the SoD ("Segregation of Duties") principle and poses a potential security risk to your company. Recertification as part of a revision: The two examples above show that a regular review of role allocation identifies potential security risks for your business and can be addressed.
Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page www.sap-corner.de you will find useful information on this topic.
If the additional memory in the Advanced Storage Area is still not sufficient for the user context, the optional second role area can be used. The size of the second roll range is determined by the difference between the parameters ztta/roll_first and ztta/roll_area. Rolling range has been eliminated in kernel release 7.4, so these parameters are obsolete from then on. Instead, the user context is now stored directly in the Advanced Memory.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
When creating the message texts in the "SCWN" message class, it is normal that after saving the changes several times (as many times as messages have been created) the question about the transport order must be confirmed.
The freeware Scribble Papers is a "note box" in which all kinds of data can be stored. It takes in typed texts as well as graphics and entire documents. The data is then organised in folders and pages.
Cleanup Phase If you already have an existing installation on the system, the first thing you need to do is uninstall all items to use a clean host for the Precalculation Server.