Firefighter authorizations

Firefighter user help to solve problems quickly and are used for infrequent or irregular activities. With firefighters, you can keep user authorizations lean because they can fall back on these emergency users in case of doubt. However, the use of firefighters in SAP systems is a critical issue for system security and compliance. That isContinue reading “Firefighter authorizations”

Identity Services – the gateway to the SAP cloud world

Identity Directory Service An SAP directory service in which all user and group assignments are stored (analogous to e.g.AD/AAD) Identity Provisioning Service A service that provisions group assignments in the backend system, including attribute mappings and transformations Identity Authentication Service The IdP from SAP. This can be used to implement MFA and SSO scenarios orContinue reading “Identity Services – the gateway to the SAP cloud world”

What are critical authorizations?

Critical authorizations and segregation of duties conflicts (SoD conflicts) are part of everyday life for authorizers. However, this does not make dealing with them any less challenging. Especially because different authorizations can be considered critical in every company. We explain how you can identify critical authorizations and how you can minimize the risk.

Transaction types in SAP

In SAP, there are a variety of transaction types that allow users to perform business processes. However, each transaction type has its own risks in terms of data protection and system security.