Professional Documents
Culture Documents
Password reset
End user mail to Basis team for resetting the password. After resetting,
new password will be initiated through mail to corresponding users.
Users unlock
End user will mails to Basis team for Unlocking the user whenever user
is locked due to wrong attempts.
As a policy, if any dialog user is not login into SAP System for more than 90
days, Admin will lock the User ID. In case of ESS User is not login into EPP
portal for more than 365 days, User will be locked by Admin. Same will be
unlocked after receiving mail from respective HOD with proper justification why
it’s not being used and also with PM, ERP approval.
c) Transport request
An SAP Transport is a package which is used to transfer data from one SAP
installation to another (One server to another server). This change can be from
a small change to major change. It can be considered as an “update”, with the
only difference being that SAP transports are made by the SAP users
themselves. Each TR contains one or more change jobs, also known as change
Tasks. All the Tasks are stored inside a TR for eg multiple files stored in some
folder.
All TRs are created in Development Server, after testing by respective teams,
Functional / ABAPERS team will send mail to Basis Teams for moving the
TRs to Quality /TEST Server (SBX).
For Production, after testing TRs in Quality/ TEST Server (SBX), Functional
team will give mail to PM, ERP for approval, on approval from PM, ERP, TRs
will be moved to Production server by Basis team.
d) Password Policy
A password policy is a set of rules designed to enhance computer security by
encouraging users to employ strong passwords and use them properly.
Passwords are an important aspect of computer security. A poorly chosen
password may result in unauthorized access and/or exploitation of
Company's resources. All users with access to Company ERP systems are
responsible for taking the appropriate steps, as outlined below, to select and
secure their passwords
The system also collects the messages from the other application servers and
writes these messages to the central log
Security audit logs are stored on the file system and not on the database, they
don’t have a performance impact. The main consideration is storage
requirements. Based on the activated event types (audit classes), data volume
may vary.
Retention period of Audit Logs is 6 months.
BASIS Daily Monitoring in SECURITY AUDIT LOG
If any user is trying to connect / operate from different location other
than user location
If any user is trying to connect / operate odd hours other than SD users
If any user is trying to connect / operate critical t-codes / Un-
authorized T-codes like SCC4, SE06, SE16N, SM30, SU01, PFCG,
ST06, SM21 etc.,
Alerting Area-IT through mail, For those systems with blank Physical
location details in Central-HW-DB (http://webhyd.scclmines.com/hw),
about to get the details of Physical location of the systems.
On request of User, Providing Audit log details like Operated T-code,
System-IPs, Timing details etc.,
f) Downtime policy
Downtime defines the time during which you cannot use a system or a
resource productively. A breakdown of one or several components
always requires action. To cope with these exceptional situations, it is
imperative to ensure that the necessary resources are available in the
event of malfunctions, problems, queries, such as an SAP specialist or
a network administrator.
There are two types of downtimes described in the following sections:
Planned Downtimes
Unplanned Downtimes
Planned Downtimes
Parameter change
Update to Support Packages (SPs) or patches
Hardware maintenance
Landscape reorganization by adding/removing an instance (to
the Core Server system)
Landscape transfer, by copying a Core Server system from one
landscape to another
Upgrades to new releases of SAP application components,
database or operating system
Database reorganization / Database backup
Archiving of business data objects
Unplanned Downtimes
SCCL Follows
All pre-requisite checks will be done before doing the activity and
after the downtime activity system will be thoroughly tested in
technical aspect before released to users
f) SSL Creation
SSL (Secure Sockets Layer) is a communication method whereby secure
communication between system entities is accomplished by the use of
encryption facilitated by X.509 certificates published by Certificate
Authorities (CA) in tandem with public and private decryption keys.
Procedure
Presently SSL is using for i) ESS portal ii) BW Dev & Production server
for SAC and iii) for PWC E-invoice & E-waybill API interface