Direkt zum Seiteninhalt
Attach Transport Orders
The HANA database (in-memory database) is an in-house development by SAP and brings with it numerous innovations. For example, it is automatically monitored by the system. In addition, it stores not only operational (user-generated) data, but also system data for controlling application content as well as configuration tables.

Either temporary programme calls are blocked that are actually desired or enormously large gateway logs must be analysed. If, due to the heavy workload, one were to decide to forgo the use of the access control lists permanently, this would be a major security vulnerability. The unprotected system does not have any limitations on the external services that may register, and there are no rules for running programmes. One possible consequence would be, for example, the registration of an external system on which malicious programmes exist. At the moment when foreign programmes are running on your system without any control, you can expect that great damage will be done. For example, it ranges from an unnoticed reading of purchase and sales figures, a diversion of funds, to a paralysis or manipulation of the entire system. In addition, this scenario is also possible for poorly maintained access control lists. Our solution: secinfo and reginfo Generator for SAP RFC Gateway To solve the problem, we have developed a generator that can automatically create secinfo and reginfo files based on gateway logs. The basic idea is based on the logging-based approach. It performs the task of time-consuming analysis of log files and also ensures maximum reliability through automation. Nevertheless, the entries of the generated files should be checked by one person. Since the log files used as input are sensitive data, of course none of the inserted data leave your system. More information about the generator can be found here.
Solution concepts basic operation: from taking over operational responsibility, 24/7 to support when needed (substitution, vacation replacement)
Without this provisioning component, adjustments to employee permissions in the respective IT resources would have to be implemented by the relevant system administrators. However, manual provisioning processes are by their very nature a source of errors. If an employee's tasks change, the system administrator should consider all active user accounts when modifying and deleting accounts. A modern IDM system therefore helps companies to keep track of users and their permissions, especially in complex and heterogeneous system landscapes.

Understanding the structure and functioning of the system is especially important for IT administration. It is not for nothing that "SAP Basis Administrator" is a separate professional field. On the page you will find useful information on this topic.

We actively support you in the migration of operating systems and databases. The optimization of time-critical processes guarantees a smooth process.

For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.

One possible consequence would be, for example, the registration of an external system on which malicious programmes exist.

So much information... how can you keep it so that you can find it again when you need it? Scribble Papers is a "note box" that makes this very easy.

This is usually divided into four pillars - the four Ps.
Zurück zum Seiteninhalt