SAP Basis Database layer - SAP Basis

Direkt zum Seiteninhalt
Database layer
The area of expertise of an SAP Basis Admin should include:
If you want to skip the backgrounds and prefer a direct step-by-step guide, you can jump directly into the last section. Preparation For this workaround, you need access to both the source system and the BW system. In addition, they shall have the possibility to access the SE37 and execute functional modules there. Especially in production systems this is a very critical justification. So assume that you may need a Firefighter user for this action. Working in the BW system Now that the preparations have been completed, you have to call a FuBa on the BW system and on the source system, which solves the connection on the respective page. Beginning on the BW system, go into the transaction SE37 and call the function block "RSAR_LOGICAL_SYSTEM_DELETE": RSAR_LOGICAL_SYSTEM_DELETE Enter the required values here. The following table helps you fill in: Field Description I_LOGSYS The logical name of the source system. The name of the source system, as found in RSA1, will be entered here. In addition, this name can also be found in the DB table TBDLT. I_FORCE_DELETE Boolean, X = Delete despite error messages I_NO_TRANSPORT Boolean, X = This change should not be transported to subsequent systems I_NO_AUTHORITY Boolean, X = Ignore Permission Checks Work in the source system In the source system, go to transaction SE37 and call the function block "RSAP_BIW_DISCONNECT" : The descriptions of the fields are as follows. These can be found in the RSBASIDOC source system connection table Field Description I_BIW_LOGSYS The logical name of the BW system. In the RSBASIDOC table, find the correct value in the column "RLOGSYS". I_OLTP_LOGSYS The logical name of the source system. The column ‘SLOGSYS’ in the table RSBASIDOC. I_FORCE_DELETE The logical name of the BW system. In the RSBASIDOC table, find the correct value in the column "RLOGSYS". Completion In the end, you have to call the respective function block in the BW and source system, fill in the parameters and execute the function block.

Often one is obliged to perform a migration. There are various reasons such as legal requirements or preparatory measures for an S/HANA conversion. We are happy to support you in your decisions.
FILE Logical file paths and names
If the additional memory in the Advanced Storage Area is still not sufficient for the user context, the optional second role area can be used. The size of the second roll range is determined by the difference between the parameters ztta/roll_first and ztta/roll_area. Rolling range has been eliminated in kernel release 7.4, so these parameters are obsolete from then on. Instead, the user context is now stored directly in the Advanced Memory.

The SAP Authorization Concept course provides a fundamental overview of the SAP authorization concept. The goal is to understand the authorization concept and the ability to define individual authorization profiles. The delivered roles and the profile generator of SAP are used.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

SAP Basis administration is distinct from other roles such as ABAP developers and consultants who handle architecture.

These vulnerabilities are detected and can now be addressed in a workflow-driven process.
SAP BASIS
Zurück zum Seiteninhalt