Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
15Activity

Table Of Contents

1 Introduction to the general authorization concept of
1.1 Requirements to an authorization concept
1.2 Functional structure
2 Detail view: Components of the authorization concept
2.1 Authorization objects
2.1.1 Structure
2.1.2 Overview of authorization objects
2.2 Authorizations
2.2.1 Structure
2.2.2 Overview of authorizations
2.3 Profiles
2.3.1 Structure
2.4 Overview of profiles
2.4.1 Overview of composite profiles
2.5 Roles
2.5.1 Structure
2.5.2 Overview of roles – the PFCG
2.5.3 Additional interfaces of the PFCG
2.5.4 Master - Derivation
2.5.5 Overview of composite roles
2.5.6 Tables with role information
2.6.1 User master record
2.6.2 The reference users
2.6.3 Basic user evaluations
2.6.4 System measurement data
3 Basic mode of operations
3.1 General relation transaction and authorization object
3.2 The authorization check for dialog users
3.3 The matching authorization
4 Evaluation tools
4.1 Report RSUSR002
4.2 Report RSUSR003
4.3 Report RSUSR008 [transaction S_BCE_68001401]
4.4 Report RSUSR009 [transaction S_BCE_68001403]
4.5 Report RSUSR008_009_NEW
4.6 Report RSUSR010
4.7 Report RSUSR020 [transaction S_BCE_68001409]
4.8 Report RSUSR030
4.9 Report RSUSR040
4.10 Report RSUSR050 [transaction S_BCE_68001433]
4.11 Report RSUSR060OBJ
4.12 Report RSUSR070 [transaction S_BCE_68001425]
4.13 Change documents
4.13.1 Report RSUSR100
4.13.2 Report RSUSR101
4.13.3 Report RSUSR102
4.13.4 Report RSSCD100_PFCG
4.13.5 SUIM – The User Information System
5 How to
5.1 How to adapt authority-check in reports
5.2 How to add an authorization object to a customer created transaction code
5.3 Table access – table protection
5.4 Protection of reports / ABAP®s
5.5 Export of tables for an authorization check
5.6 The SAP® system trace
5.7 Transaction SE16N – risk and control
5.8 Transaction SE16 –risk and control
5.9 SAP® NetWeaver security parameter
5.10 The evaluation of the SysLog – SM21
5.11 Segregation of duties in the financial accounting (Asymmetric approach)
5.12 Table of content for the documentation of an authorization concept
5.13 Selected relevant Security tables
0 of .
Results for:
No results containing your search query
P. 1
Practical Guide for SAP Security

Practical Guide for SAP Security

Ratings: (0)|Views: 1,056 |Likes:
Published by ludens_kz

More info:

Published by: ludens_kz on Feb 17, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/19/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 58 are not shown in this preview.
You're Reading a Free Preview
Pages 60 to 171 are not shown in this preview.

Activity (15)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
mapskkal liked this
rb_2007 liked this
dkeerthan liked this
Eli Hazan liked this
dkeerthan liked this
rentala liked this
Gurpreet Kaur liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->