You are on page 1of 11

SAP SECURITY Online

Training

1SAPR/3Security

1.1OverviewofSAP
1.2OverviewofSAPBASIS
1.3IntroductiontoSAPSecurity
1.3.1Whyweneedsecurity
1.3.2Whatneedstobeprotected
1.3.3Fromwhomweneedtoprotect
1.3.4Implementationmethodology

1.4Useradministration

1.4.1Singleuseradministration
1.4.2MassUseradministration
1.4.3LSMWScriptrunning
1.5IntroductionofCUA(CentralUser
administration)
1.5.1CUAConfigurationfor
differentlandscapes

1.5.2Performinguseradministration

activitiesinCUA
1.5.3DistributingUser/IDOCSand
troubleshootingissues
1.6UserGroupsConcept
1.7RoleAdministrationand
authorizationsconcept
1.7.1Overviewofauthorizations
androles

1.7.2Changemanagement
process
1.7.3Creatingcustom
authorizationobjects
1.7.4SAPRoletypes
1.7.5WorkingwithProfile
Generator
1.7.6Creatingandmodifying
differentroles

1.8AuthorizationGroupConcept

1.9Missingauthorization
1.10Tracingtheuserformissing
authorization.
1.11WorkingwithR/3tables,
parametersandReports
1.12SAPSecurityAudit.

2.

BW/BI Security
2.1ArchitectureandstrategiesforaBI
authorizationconcept
2.2SecurityrequirementsinSAPBI
2.3Standardrolesandtemplatesfor
theauthorizationconcept

2.4CreatingBW/BIrolesandmodification
2.5DifferencebetweenBWandR/3
security
2.6DifferencebetweenBWandBI
Security
2.7Differentauthorizationobjects
involvedinBW/BI
2.8Analysisauthorizationconceptand
reporting
2.9TroubleshootingBW/BIissues

3 HR Security
3.1IntroductiontoHRsecurity
3.2Personaladministrationand
Organizationalmanagement
3.3HRGeneralandStructural
authorizations
3.4HRauthorizationobjectsandinfotypes
3.5TroubleshootingHRissues

Contactus:
Ind-9989754807
US:4752120075
Aus:+61280917878
www.keentechnologies.com

THANKYOU

You might also like