SAP Basis USE OF THE SECURITY AUDIT LOG - SAP Basis

Direkt zum Seiteninhalt
USE OF THE SECURITY AUDIT LOG
Presentation layer
The SAP Authorization Concept course provides a fundamental overview of the SAP authorization concept. The goal is to understand the authorization concept and the ability to define individual authorization profiles. The delivered roles and the profile generator of SAP are used.

There are the following reasons that may lead to the termination of this step: CANNOT_SKIP_ATTRIBUTE_RECORD: The attributes cannot be read in the OCS file. The file probably cannot be opened for reading because it has been deleted in the meantime, or the permissions at the operating system level are insufficient. CANNOT_DETERMINE_EPS_PARCEL: The OCS file does not exist in the EPS inbox; presumably it was deleted.
SMT1 Trusted - Trusting Connections
The SAP Basis & Technology department deals intensively with SAP technologies and their application. The possibilities and limits are examined and corresponding specifications and tools are developed in order to use the technologies profitably. The results and findings are made available to the other alogis areas and implemented in real-life customer projects.

Significant changes have also been brought about by SAP's cloud strategy. For example, the latest products such as SAP HANA and SAP S/4HANA are available entirely as cloud solutions.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

Furthermore, the GUI properties of the SM30 should be inherited so that the parameter transaction can be started with the same software.

Examples of how to standardise procedures are listed here: ・ Naming of system instances and logical hosts, or at least one central registry in a directory service, or LVM or SAP customer portal ・ Centrally starting and stopping systems, such as via the LVM ・ Categorising SAP instances by T-shirt size to define profile standards and cost them.
SAP BASIS
Zurück zum Seiteninhalt