Professional Documents
Culture Documents
Training
1SAPR/3Security
1.1OverviewofSAP
1.2OverviewofSAPBASIS
1.3IntroductiontoSAPSecurity
1.3.1Whyweneedsecurity
1.3.2Whatneedstobeprotected
1.3.3Fromwhomweneedtoprotect
1.3.4Implementationmethodology
1.4Useradministration
1.4.1Singleuseradministration
1.4.2MassUseradministration
1.4.3LSMWScriptrunning
1.5IntroductionofCUA(CentralUser
administration)
1.5.1CUAConfigurationfor
differentlandscapes
1.5.2Performinguseradministration
activitiesinCUA
1.5.3DistributingUser/IDOCSand
troubleshootingissues
1.6UserGroupsConcept
1.7RoleAdministrationand
authorizationsconcept
1.7.1Overviewofauthorizations
androles
1.7.2Changemanagement
process
1.7.3Creatingcustom
authorizationobjects
1.7.4SAPRoletypes
1.7.5WorkingwithProfile
Generator
1.7.6Creatingandmodifying
differentroles
1.8AuthorizationGroupConcept
1.9Missingauthorization
1.10Tracingtheuserformissing
authorization.
1.11WorkingwithR/3tables,
parametersandReports
1.12SAPSecurityAudit.
2.
BW/BI Security
2.1ArchitectureandstrategiesforaBI
authorizationconcept
2.2SecurityrequirementsinSAPBI
2.3Standardrolesandtemplatesfor
theauthorizationconcept
2.4CreatingBW/BIrolesandmodification
2.5DifferencebetweenBWandR/3
security
2.6DifferencebetweenBWandBI
Security
2.7Differentauthorizationobjects
involvedinBW/BI
2.8Analysisauthorizationconceptand
reporting
2.9TroubleshootingBW/BIissues
3 HR Security
3.1IntroductiontoHRsecurity
3.2Personaladministrationand
Organizationalmanagement
3.3HRGeneralandStructural
authorizations
3.4HRauthorizationobjectsandinfotypes
3.5TroubleshootingHRissues
Contactus:
Ind-9989754807
US:4752120075
Aus:+61280917878
www.keentechnologies.com
THANKYOU