Troubleshooting and support
Migration from SAP ERP to SAP S/4HANA
An SAP HANA system lives on applications. When you develop these applications, you should think about securing them early. Using HTTPS instead of HTTP is one of the basics. In addition, you ensure secure authentication and implement a Secure Software Development Lifecycle to ensure backup in your own developments. In your applications, you better start to check them for risks early on and run this backup process regularly. You can analyse and restrict access to source code later. Create a risk register and address security vulnerabilities in a risk-based manner. The later you discover a risk, the more expensive the fix will be. Further information on SAP Security in addition to the article can be found here. Do you have any further questions or suggestions concerning this topic? Would you like us to go further on the subject? I look forward to your feedback!
In the case of distributed or local SAP systems, it can also be helpful if departments or decentralized IT units can schedule their own jobs themselves. It is important that the associated approval processes can also be mapped and easily tracked. This brings convenience, flexibility and a degree of freedom without neglecting operational security. The integration of the business departments can relieve the IT administrator and turn background processing into an end-to-end process integrated into the organization.
This SAP training covers the introduction/basics of SAP administration. You will learn the basic functions of the SAP system. You will learn the most important administrative tasks, such as user administration and roles, the SAP data transport system, security in the SAP environment, administrative background tasks and system monitoring.
SAP Basis administration is distinct from other roles such as ABAP developers and consultants who handle architecture. In many companies, the boundaries between administration and development are blurred. Admins may therefore also be involved in the planning and development of the system.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
Create Inheritance for SAP Permissions The following shows how to create and use inheritances for SAP permissions.
To do this, open the PFCG transaction and enter the desired name of the master role in the Name field.