SAP Basis To transport rejected transport jobs in the SAP system - NW Admin

Direkt zum Seiteninhalt
To transport rejected transport jobs in the SAP system
Backup concept for the Azure or AWS cloud
As a hint: The menu tab "Jump" allows you to set all namespaces or software components simultaneously to "modifiable" or "non-modifiable". However, before you can rearrange the namespace and software components, you must also adjust the global setting accordingly. With Save or CTRL+S you can now save your new settings and you have already set the system modifiability.

The Precalculation Server is a standalone application that allows you to generate and distribute Excel workbooks based on SAP BI data. Are you already using the Precalculation Server or would you like to take advantage of it in the future? I would be happy to explain the steps from installing the Precalculation Server to finally starting the instances on the target system so that you can use the Precalculation Server for your purposes. As a reader of our blog, you are certainly interested in tricks and tricks that will make your SAP system easier to handle. You may be familiar with the situation where you want to install a Precalculation Server yourself. Here you will learn how this task can be implemented in the SAP environment. Prerequisites For example, you need a Windows 7 or a Windows Server 2012 instance on which the Precalculation Server is installed to operate the Precalculation Server. Both 32 and 64-bit versions can be used. In addition, the machine requires a .NET installation to run the Precalculation Server in addition to a Microsoft Excel installation (32-bit version is essential). Download the installation files In advance, you should download the latest installation files from the official SAP website to the target computers. Cleanup Phase If you already have an existing installation on the system, the first thing you need to do is uninstall all items to use a clean host for the Precalculation Server. You can do this by calling the Windows Control Panel: The order must be followed according to the SAP documentation. Therefore, apply the following procedure for uninstallation, no installation of SAP should be visible anymore: Order: 1) SAP BW Precalculation Service 2) SAP Business Explorer 3) SAP GUI for Windows XY Note: During the installation and uninstallation of individual components, the progress bar status may be suspended at certain locations. This is not a cause for concern, but a normal behaviour. Often, it will stand at 92% or 95% for about 10 minutes.
Migration to the cloud: Azure, Amazon, Google, others
New risks in SAP HANA: In addition to the known risks, there are also new risks from the use of SAP HANA. A very good example are frequently used web applications that represent something new in the SAP area. In contrast to an SAP ERP system, HANA systems consist mainly of web applications, which were considered optional in the previous versions. These web applications can be found by various search engines on the Internet. This also applies to SAP Portal or Netweaver. There are URL schemes that help locate the system. This also applies to other SAP systems that use Web applications. This makes the new technology vulnerable to typical web attacks. SQL Injection, ABAP Code Injection, or XSS are all included. All risks known for a normal SAP system also apply to a SAP-HANA system. The data is stored unencrypted in RAM. Only then does the system gain this speed advantage. This results in risks such as a read-out by memory scraping malware. These pick up data in memory. Encryption costs performance, so it is not used by default. Especially during a migration HANA runs in a parallel system, therefore at least one new system comes to your landscape. Also note: HANA has its own tools and settings that need to be known and configured. The bottom line is that the system simply needs more attention when operating. Many settings often result in more errors. Three - points - HANA Security Plan 1) Roles and permissions In a previous SAP system, roles and permissions are certainly one of the main pillars of a secure system. Roles and permissions work differently in a HANA system. There are two types of users: 1) Default (limited): With this type of user, there are different access methods to the database. For example, the JDBC or HTTP technologies are used to give two examples.

The website www.sap-corner.de offers many useful information about SAP basis.


SAP Basis is also known as module BC or application Basis. SAP Basis refers to all transactions, programs and objects that control the functions of the overall system. This includes, among other things, user and authorization management as well as the configuration of interfaces via RFC.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

Internal communication is an important aspect for the SAP basis.

The freeware Scribble Papers is a "note box" in which all kinds of data can be stored. It takes in typed texts as well as graphics and entire documents. The data is then organised in folders and pages.

However, since this is desired, the access control lists must be gradually expanded to include each programme required.
NW BASIS
Zurück zum Seiteninhalt