SAP Basis SWPM - the Software Provisioning Manager integrates the classical tools like sapinst, ehpup, etc for the maintenance/installation of SAP systems - NW Admin

Direkt zum Seiteninhalt
SWPM - the Software Provisioning Manager integrates the classical tools like sapinst, ehpup, etc for the maintenance/installation of SAP systems
System Guides
If an error occurs, the transaction WE05 can be used to analyse it. What experience have you had with EDI? I look forward to your feedback.

In this article on SAP Security Automation I would like to take a look at the future of automated processes in the SAP Security area. For many companies, the topic of security automation still offers a lot of potential in terms of time savings and process optimisation. Our daily work environment offers numerous tasks that could be handled excellently automatically. For this reason, in this article I present two of the possibilities that already exist in the broad area of security automation. Security Automation via SAP Security Check The first option of Security Automation, which I want to introduce here, is the automatic verification of the existing permissions. Have you ever wondered who has critical permissions in your SAP system? And have you ever tried to do this by hand? Depending on the level of expertise and experience of the privilege administrator, this is a time-consuming work. If an audit is also announced and the SAP system is to be checked for critical permissions and segregation of duties, then it is very difficult to meet all requirements and secure the eligibility landscape in this respect. For this reason, various vendors provide solutions to automate the verification of the permission system with regard to critical permissions and segregation of duties using tool support. This allows permission administrators to use their valuable time to correct the errors rather than just looking for them. For example, we use a tool that runs through the verification of over 250 rules. We then get an evaluation of which rules are violated and which points are correct. A simple example of such rules is the use of the SAP_ALL profile. Another would be to grant the jump permission in debugging (S_DEVELOP permission object with the ACTVT = 02 field). These are two relatively simple examples of Security Check tools' rulebook. In addition, queries are also made, which are located in the field of Segregation of Duties. Using this tool allowed us to move from manual validation of critical permissions to an automatic process.
RETURN MODIFICATIONS TO SAP STANDARD
First you have to create an area menu in the area menu maintenance with the transaction code SE43 or SE43N. Then add the created menu to the SAP standard menu S000.

The website www.sap-corner.de offers many useful information about SAP basis.


The tasks of a company's own SAP Basis department are currently undergoing enormous change, as SAP is also increasingly relying on cloud services. Strategically, completely self-hosted SAP systems are becoming rarer and the proportion of customers using an SAP system from the cloud is increasing. The new roles of SAP Basis employees tend to be "enablers" and coordinators between the cloud provider and internal IT and the business departments. Until that time comes, companies can also rely on external service providers to offer expert know-how as well as operational support for the transition period.

The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.

SAP Basis experts ensure optimal integration of the SAP system into a company's individual IT landscape.

To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.

For example, for the parameter abab/heap_area_dia, the RZ11 outputs: Description of the parameter abap/heap_area_dia in the RZ11 As you can see here, it is not a dynamic parameter.
NW BASIS
Zurück zum Seiteninhalt