SAP Basis SM37C Advanced job selection - NW Admin

Direkt zum Seiteninhalt
SM37C Advanced job selection
SAP Basis Administrator
Setting up Client certificate for access to SAP ONE Support Launchpad This week it was again: The Client certificate for SAP Support has expired. Who wonders how I can set up the client certificate in the browser? Here is the instructions against password-pop-up terror. Short and painless. Launchpad Call Personalisation SAP Passport Add Kachel to the Home Group View Kachel in My Home Create SAP Passport Certificate (with S-Users password) Download Certificate Open and Import Certificate Close Browser Then. If you (like me) have been looking for this feature for a long time, I'm glad to have a short ping in the comment.

Companies face a major challenge. The world is not going digital, but it is already. The age of digitisation and the related technological changes, as well as the demands of customers, bring new opportunities and new challenges for companies. In addition, the product strategy is changing, including that of SAP. In order to achieve the associated goals of the company and to implement them as effectively and efficiently as possible, the SAP basis must contribute to the design of an IT roadmap and to the design of the digitisation and also cloud strategy. A detailed review of the IT Roadmap recommendation is carried out within the master thesis in chapter 7.9.
SM30 Table maintenance
Customers with such a case regularly contact us. Creating a Permission Concept from the ground up is often a time-consuming task. Furthermore, the know-how, which aspects should be dealt with in an authorisation concept and how the corresponding processes can look practical and at the same time audit-proof is often lacking. Our solution: tool-based generation of an individual, written authorisation concept In this situation, we have recommended to our customers the tool-based generation of a written authorisation concept directly from the SAP system. We use the XAMS Security Architect tool, with which we have had good experiences. This includes a template for a revision-proof and comprehensible, written authorisation concept. It includes established best practices for role and entitlement management. The template covers all relevant areas in a permission concept. The included text of the authorisation concept is completely customisable, so that the concept can be tailored to your situation without creating a permission concept from scratch. Dynamically update the written authorisation concept One of the biggest challenges after the development of an authorisation concept is to keep it up to date in the long term and to measure the sustainable implementation in the system. This is achieved by integrating live data such as configuration settings and defined rules directly from the connected system. For example, lists of existing roles or user groups and tables are read from the system each time the document is generated and updated in the permission concept. The following screenshot shows an example of what the appearance in the concept document might look like. Automatically check and monitor compliance with the concept To check compliance with the concept, the XAMS Security Architect includes extensive inspection tools. These cover the rules formulated in the concept and are suitable for measuring the extent to which the reality in the system meets the requirements formulated in the concept.

If you want to get more information about SAP basis, visit the website www.sap-corner.de.


SAP HANA has been one of the major topics in the SAP environment for the last few years. Many customers are currently faced with the question of whether or not to migrate your SAP system. In addition to the actual changeover itself, there are many other topics on which you should have already informed yourself in advance, as these influence the success of SAP HANA in your company. What do you already know about SAP HANA? I would like to encourage you to think about security in the following article. If you would like to learn about the architecture of HANA, I recommend a contribution from our colleagues at erlebe Software. SAP HANA Scenario But why are we even talking about HANA Security? Why is it so important to consider new security strategies with the new technology? With HANA it is possible to analyse data quickly. BW scenarios primarily benefit from the in-memory database (IMDB) used, as speed advantages in data access are particularly positive. Compared to a classic ERP / R3 scenario, the normal DB is replaced by HANA. The desired speed advantages result. However, migration is expected to be required for the changeover. This is caused by customer-specific developments in the system. HANA is not a further development of SAP ERP, HANA is the next stage of an ERP system. It is well known that an ERP system contains the capital of the companies. Therefore a new HANA system like all other ERP systems is also interesting for attackers. On the one hand, such a system contains the critical business data that are available for espionage. In addition, most business processes are mapped in such a system and offer an attack surface for sabotage. In addition, users do not initially know the new technology well. This also applies to administrators in the area of a new technology. Attackers quickly gain a dangerous leap of knowledge over these user groups. SAP HANA has a lot of new features, although many existing ones are used by SAP ERP, so there is a risk here.

The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.

In the area of SAP Basis Operations, we handle all technical tasks for our customers that arise during the installation, operation and maintenance of SAP systems.

So much information... how can you keep it so that you can find it again when you need it? That's what Scribble Papers is great for.

The comparison can be done in any client.
NW BASIS
Zurück zum Seiteninhalt