Firefighter user help to solve problems quickly and are used for infrequent or irregular activities. With firefighters, you can keep user authorizations lean because they can fall back on these emergency users in case of doubt. However, the use of firefighters in SAP systems is a critical issue for system security and compliance. That isContinue reading “Firefighter authorizations”
Category Archives: Allgemein
Audit-proof SAP authorizations
Customers want “audit-proof” authorizations, but what exactly does that mean? What exactly do auditors scrutinize and which authorizations are classified as particularly critical? We’ll find out today.
Securely authorize table access
Table authorizations are necessary and at the same time a security risk. Find out how you can optimize table access authorizations.
Fiori 3.0: What Spaces, Pages and Sections are all about
Fiori is no longer a new technology. But the latest version has brought a whole series of changes that are also relevant for authorized users. We take a look at what the new Fiori objects Spaces, Pages and Sections are all about – and how they affect authorizations.
User groups: Restrict user and role administration
User groups: more control over who can create, change and assign roles to which users in a particular SAP system.
How to: Maintain tables without SE16N “maintenance authorization”
If table maintenance via transaction SE16N does not work, you can use debug mode to remedy the situation.
Using the user buffer and user synchronization correctly
If authorization errors occur despite correct authorizations, it is worth taking a closer look at the user buffer.
SAP HCM: dual control principle
In this article, we explain how you can implement the dual control principle in SAP HCM to protect sensitive data.
SAP HCM: Context-sensitive authorizations
How to use context-sensitive authorizations in the SAP HCM system, which objects you need and what you need to pay attention to.
Create your own authorization objects
SAP provides suitable authorization objects for almost every requirement. But sometimes the standard is not enough. In this case, you can create your own authorization objects and then integrate them into your roles. We will now show you how to do this. Today we are working with an example from the HR area within theContinue reading “Create your own authorization objects”