IAM + SAP authorizations:
Tips and tricks from experienced consultants
In more than 20 years as an SAP consultant, you gain a lot of experience. Good and bad. We share the good ones here – the secret tricks that make working easier. Do you need more individual support? Feel free to contact us for a personal offer!
Firefighter authorizations
Firefighter user help to solve problems quickly and are used for infrequent or irregular activities.…
Audit-proof SAP authorizations
Customers want "audit-proof" authorizations, but what exactly does that mean? What exactly do audito…
Securely authorize table access
Table authorizations are necessary and at the same time a security risk. Find out how you can optimi…
Fiori 3.0: What Spaces, Pages and Sections are all about
Fiori is no longer a new technology. But the latest version has brought a whole series of changes th…
Identity Services – the gateway to the SAP cloud world
Identity Directory Service An SAP directory service in which all user and group assignments are stor…
What are critical authorizations?
Critical authorizations and segregation of duties conflicts (SoD conflicts) are part of everyday lif…
Transaction types in SAP
In SAP, there are a variety of transaction types that allow users to perform business processes. How…
Analysis tools in SAP authorizations
Suddenly, a user can no longer work properly in the SAP system. And of course – allegedly – missing …
Authorize function modules
Function modules (FuBa) are used everywhere in the SAP system. The standard already delivers a large…
Basic role for all users
A basic role combines almost all authorizations that all users need. It can be assigned automaticall…
Using parameter transactions
Preventing input errors and speeding up processes – to ensure this, parameter transactions are often…
Using SAP_ALL and SAP_NEW correctly
The standard SAP_ALL and SAP_NEW profiles allow you to assign a user full authorizations for all tra…
Implementing authorizations in SAP BW/BI correctly
Finance, controlling, logistics: As an authorizer, the trade is the same in most modules. However, a…
Role types in SAP systems
SAP authorizations function via the assignment of roles, which in turn contain authorizations. Now, …
Authorization objects that almost always run to error – but are never the real problem
There are a number of authorization objects that run into errors in almost every SU53 and often in t…
User groups: Restrict user and role administration
User groups: more control over who can create, change and assign roles to which users in a particula…
How to: Maintain tables without SE16N “maintenance authorization”
If table maintenance via transaction SE16N does not work, you can use debug mode to remedy the situa…
Using the user buffer and user synchronization correctly
If authorization errors occur despite correct authorizations, it is worth taking a closer look at th…
SAP HCM: dual control principle
In this article, we explain how you can implement the dual control principle in SAP HCM to protect s…
SAP HCM: Context-sensitive authorizations
How to use context-sensitive authorizations in the SAP HCM system, which objects you need and what y…
Create your own authorization objects
SAP provides suitable authorization objects for almost every requirement. But sometimes the standard…
The most important user transactions
Before the authorization comes the analysis. Which roles, transactions, profiles and authorization o…
S/4HANA: Which Fiori app replaces which transaction?
Are you currently converting your SAP system and introducing Fiori apps? Then we have a quick but ve…
How To: Find, integrate and authorize Fiori apps
Fiori gives SAP a modern face. Users no longer have to control their work via transaction codes, but…
How To: Create and use SAP Query
How to create and maintain a Query in SAP with step by step instructions – that is what we are talki…
SAP Query: Reports from database tables
With "SAP Query", you can read out and analyze tables, i.e. bundle and present data in such a way th…
Everything new with Fiori
With Fiori, SAP users have to adapt to a whole new way of working. Tiles instead of transactions, gr…
Which trace is the right one?
A user cannot execute a certain transaction and we want to find out why. Or a user needs a new, addi…
PFCGMASSVAL: authorization changes for multiple roles or objects at the same time
With transaction PFCGMASSVAL, SAP has introduced a function that can save a lot of time, especially …
General authorizations in SAP HCM
General authorizations are one of a total of 3 authorization concepts in SAP ERP HCM. In HCM, data i…
Authorizations in SAP HCM
Like any other area in the company, the HR area is also managed via authorizations. In this way, it …
SAP HCM: Structural authorizations
Do you want to assign authorizations in HR that still work when a department grows or structures in …
Master roles, child roles and inheritance
In corporate reality, it is often the case that a large number of roles should have identical charac…
HANA: Where are my authorization objects?
SAP has a fairly mature and sophisticated authorization system. It can be used to protect virtually …
SAP authorizations: The most important transactions
There are a handful of transactions to get you through the world of SAP authorizations. Not complica…
The most important tables in SAP authorization management
In SAP, tables are a very effective way of obtaining information in daily authorization work. They c…