Blog

IAM + SAP authorizations:
Tips and tricks from experienced consultants

In more than 20 years as an SAP consultant, you gain a lot of experience. Good and bad. We share the good ones here – the secret tricks that make working easier. Do you need more individual support? Feel free to contact us for a personal offer!

Firefighter authorizations

Firefighter user help to solve problems quickly and are used for infrequent or irregular activities.…

Audit-proof SAP authorizations

Customers want "audit-proof" authorizations, but what exactly does that mean? What exactly do audito…

Securely authorize table access

Table authorizations are necessary and at the same time a security risk. Find out how you can optimi…

Fiori 3.0: What Spaces, Pages and Sections are all about

Fiori is no longer a new technology. But the latest version has brought a whole series of changes th…

Identity Services – the gateway to the SAP cloud world

Identity Directory Service An SAP directory service in which all user and group assignments are stor…

What are critical authorizations?

Critical authorizations and segregation of duties conflicts (SoD conflicts) are part of everyday lif…

Transaction types in SAP

In SAP, there are a variety of transaction types that allow users to perform business processes. How…

Analysis tools in SAP authorizations

Suddenly, a user can no longer work properly in the SAP system. And of course – allegedly – missing …

Authorize function modules

Function modules (FuBa) are used everywhere in the SAP system. The standard already delivers a large…

Basic role for all users

A basic role combines almost all authorizations that all users need. It can be assigned automaticall…

Using parameter transactions

Preventing input errors and speeding up processes – to ensure this, parameter transactions are often…

Using SAP_ALL and SAP_NEW correctly

The standard SAP_ALL and SAP_NEW profiles allow you to assign a user full authorizations for all tra…

Implementing authorizations in SAP BW/BI correctly

Finance, controlling, logistics: As an authorizer, the trade is the same in most modules. However, a…

Role types in SAP systems

SAP authorizations function via the assignment of roles, which in turn contain authorizations. Now, …

Authorization objects that almost always run to error – but are never the real problem

There are a number of authorization objects that run into errors in almost every SU53 and often in t…

User groups: Restrict user and role administration

User groups: more control over who can create, change and assign roles to which users in a particula…

How to: Maintain tables without SE16N “maintenance authorization”

If table maintenance via transaction SE16N does not work, you can use debug mode to remedy the situa…

Using the user buffer and user synchronization correctly

If authorization errors occur despite correct authorizations, it is worth taking a closer look at th…

SAP HCM: dual control principle

In this article, we explain how you can implement the dual control principle in SAP HCM to protect s…

SAP HCM: Context-sensitive authorizations

How to use context-sensitive authorizations in the SAP HCM system, which objects you need and what y…

Create your own authorization objects

SAP provides suitable authorization objects for almost every requirement. But sometimes the standard…

The most important user transactions

Before the authorization comes the analysis. Which roles, transactions, profiles and authorization o…

S/4HANA: Which Fiori app replaces which transaction?

Are you currently converting your SAP system and introducing Fiori apps? Then we have a quick but ve…

How To: Find, integrate and authorize Fiori apps

Fiori gives SAP a modern face. Users no longer have to control their work via transaction codes, but…

How To: Create and use SAP Query

How to create and maintain a Query in SAP with step by step instructions – that is what we are talki…

SAP Query: Reports from database tables

With "SAP Query", you can read out and analyze tables, i.e. bundle and present data in such a way th…

Everything new with Fiori

With Fiori, SAP users have to adapt to a whole new way of working. Tiles instead of transactions, gr…

Which trace is the right one?

A user cannot execute a certain transaction and we want to find out why. Or a user needs a new, addi…

PFCGMASSVAL: authorization changes for multiple roles or objects at the same time

With transaction PFCGMASSVAL, SAP has introduced a function that can save a lot of time, especially …

General authorizations in SAP HCM

General authorizations are one of a total of 3 authorization concepts in SAP ERP HCM. In HCM, data i…

Authorizations in SAP HCM

Like any other area in the company, the HR area is also managed via authorizations. In this way, it …

SAP HCM: Structural authorizations

Do you want to assign authorizations in HR that still work when a department grows or structures in …

Master roles, child roles and inheritance

In corporate reality, it is often the case that a large number of roles should have identical charac…

HANA: Where are my authorization objects?

SAP has a fairly mature and sophisticated authorization system. It can be used to protect virtually …

SAP authorizations: The most important transactions

There are a handful of transactions to get you through the world of SAP authorizations. Not complica…

The most important tables in SAP authorization management

In SAP, tables are a very effective way of obtaining information in daily authorization work. They c…