Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1 Introduction to the general authorization concept of
1.1 Requirements to an authorization concept
1.2 Functional structure
2 Detail view: Components of the authorization concept
2.1 Authorization objects
2.1.1 Structure
2.1.2 Overview of authorization objects
2.2 Authorizations
2.2.1 Structure
2.2.2 Overview of authorizations
2.3 Profiles
2.3.1 Structure
2.4 Overview of profiles
2.4.1 Overview of composite profiles
2.5 Roles
2.5.1 Structure
2.5.2 Overview of roles – the PFCG
2.5.3 Additional interfaces of the PFCG
2.5.5 Overview of composite roles
2.5.6 Tables with role information
2.6 User
2.6.1 User master record
2.6.2 The reference users
2.6.3 Basic user evaluations
2.6.4 System measurement data
3 Basic mode of operations
3.1 General relation transaction and authorization object
3.2 The authorization check for dialog users
3.3 The matching authorization
4 Evaluation tools
4.1 Report RSUSR002
4.2 Report RSUSR003
4.3 Report RSUSR008 [transaction S_BCE_68001401]
4.4 Report RSUSR009 [transaction S_BCE_68001403]
4.5 Report RSUSR008_009_NEW
4.6 Report RSUSR010
4.7 Report RSUSR020 [transaction S_BCE_68001409]
4.8 Report RSUSR030
4.9 Report RSUSR040
4.10 Report RSUSR050 [transaction S_BCE_68001433]
4.11 Report RSUSR060OBJ
4.12 Report RSUSR070 [transaction S_BCE_68001425]
4.13 Change documents
4.13.1 Report RSUSR100
4.13.2 Report RSUSR101
4.13.3 Report RSUSR102
5.1 How to adapt authority-check in reports
5.2 How to add an authorization object to a customer created transaction code
5.3 Table access – table protection
5.4 Protection of reports / ABAP®s
5.5 Export of tables for an authorization check
5.6 The SAP® system trace
5.7 Transaction SE16N – risk and control
5.8 Transaction SE16 –risk and control
5.9 SAP® NetWeaver security parameter
5.10 The evaluation of the SysLog – SM21
5.11 Segregation of duties in the financial accounting (Asymmetric approach)
5.12 Table of content for the documentation of an authorization concept
5.13 Selected relevant Security tables
0 of .
Results for:
No results containing your search query
P. 1
Practical Guide for SAP Security

Practical Guide for SAP Security

|Views: 1,167|Likes:
Published by ludens_kz

More info:

Published by: ludens_kz on Feb 17, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 25 are not shown in this preview.
You're Reading a Free Preview
Pages 29 to 51 are not shown in this preview.
You're Reading a Free Preview
Pages 55 to 113 are not shown in this preview.
You're Reading a Free Preview
Pages 117 to 160 are not shown in this preview.
You're Reading a Free Preview
Pages 164 to 171 are not shown in this preview.

Activity (15)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
mapskkal liked this
rb_2007 liked this
dkeerthan liked this
Juan Ignacio Álvarez Hernández liked this
Eli Hazan liked this
dkeerthan liked this
rentala liked this
Gurpreet Kaur liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->