ABE-IPSABE HOLDINGABE BOOKS
English Polski
Dostęp on-line

Książki

0.00 PLN
Schowek (0) 
Schowek jest pusty
Authorizations in SAP: 100 Things You Should Know About...

Authorizations in SAP: 100 Things You Should Know About...

Autorzy
Wydawnictwo SAP Press
Data wydania 25/04/2012
Liczba stron 346
Forma publikacji książka w miękkiej oprawie
Poziom zaawansowania Literatura popularna
Język angielski
ISBN 9781592294060
Kategorie SAP (systemy, aplikacjei bazy danych produktów)
443.10 PLN (z VAT)
$99.67 / €95.00 / £82.47 /
Produkt na zamówienie
Dostawa 3-4 tygodnie
Ilość
Do schowka

Opis książki

Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with ""100 Things"" that unlock the secrets of managing your security and authorizations in SAP.The tips are grouped together based on the area of authorizations they cover, such as development security, Profile Generator, upgrades, and more. They have been carefully selected to provide a collection of the best, most useful, and rarest information. An invaluable resource to support you in your SAP administration duties! Highlights:

User master records
Development security
Profile Generator
Segregation of duties
Upgrades
Auditing
Security templates
Continuous Compliance and Governance

Authorizations in SAP: 100 Things You Should Know About...

Spis treści

Acknowledgments

PART 1

User Master Records

Displaying the Technical Names of Transactions in the SAP Easy Access Menu en Masse

Improving Your User Master Record Accuracy with Hidden Fields

Defining an SAP User ID Naming Convention to Manage User Master Records

Using BAPIs to Help Mass-Maintain the User Master Record

Customizing the Rules for Automatically Generated Passwords During User Creation

Finding and Using User Parameters to Prepopulate Transactional Fields

Improving Your Business Reporting through User Groups

Working with Inactive Users

Customizing SAP and User Menus through the Session Manager

Assigning Roles through an Organization Structure without SAP HCM Deployed

Constraining Organization Structure Visibility through an HR Personnel Development Profile

Automatically Maintaining Structural Authorizations

Linking User Master Records to HR Data

Performing Mass Changes for Users and Roles in Java

Displaying Authorization Errors in Transaction Log SU53 for Different Users

Customizing Users' Selection en Masse

Mass-Changing Secure Network Communications Data for SSO User Mapping

PART 2

Development Security

Validating Your ABAP Code before Moving into the Production System

Archiving and Restoring a User's Favorites

Displaying the Security Data Dictionary Definition with the Object Navigator

Finding Vulnerability Strings in Your ABAP Code

Creating a Transaction Variant to Restrict User Activities

Finding Authorization Object Documentation

Searching for Values and Definitions in ABAP Data Dictionary Tables

Mass-Exporting Query User Group Information

Managing an Authorization Check in the Transaction Header

Restricting a User's Access to Called Transactions

Managing Customizing Tables in a Production System

Analyzing Your Security System to Keep it Updated

Using Parameter Transactions to Avoid Giving Direct Tables/Programs Access to End Users

Discovering Maintenance Customizing Transactions with a Table Name

PART 3

Profile Generator

Finding Roles That Contain Transactions at the Menu Level

Permanently Enable the Technical Name View in Transaction PFCG's Authorization Tree

Creating a Sustainable Authorization Roles Naming Convention

Evaluating the Manual or Modified Authorization Status during Profile Generator Maintenance

Creating an SAP_ALL Display-Only Role

Maintaining an Aligned Set of Job Roles with a Naming Convention

Designing and Assigning a Basic Role to All Users

Maintaining Derived Roles to Improve Authorization Maintenance

Discovering Misalignment between Transactions by Downloading Data to Spreadsheets

Finding Misinterpreted Authorization Wildcards in Your Roles

Performing Mass Downloads and Uploads of Standard Authorization Values

Setting Up Mass Adjustments for Derived Roles

Troubleshooting Authorization Problems for Users

Customizing Your Tree Menu Settings to Avoid Duplicate Structures

Automatically Populating the Authorization Objects Transaction Link When Performing a Developer Trace

Adjusting Query Maintenance to Avoid Security Problems

Cleaning Up Unused Batch Jobs

Setting Up Authorizations to Allow Internet Service

Avoiding Security Holes during SAP Menu Role Maintenance

Changing the Rules to Generate Profile Names

Comparing Authorization Roles to Check for Alignment Between Systems

Replacing the Parent Role of a Derived Role en Masse

Generating Large Quantities of Profiles for Roles in a Single Transaction

Using SAP BAPIs to Manage Roles with an External Program

Using Manual Composite Profiles to Bypass the Profile Technical Limit of 312

Using Parameter IDs and Customizing Transactions to Manage Authorizations

Removing Expired User-Role Links

Filtering Roles by Their Status

PART 4

Segregation of Duties

Tailoring Your Ad-Hoc Analysis by Using Custom Groups in RAR and ARA

Modifying Your Selection Criteria for User/Roles Analysis in SAP GRC 10.0

Clustering Data to Enhance Your RAR Reporting for Easier Consumption

Performing a User Impact Risk Analysis

Setting Selection Criteria for the Web Interface as a Default Value

Defining a Firefighter User ID Naming Method

Using Organizational-Level Mapping in Business Role Management to Improve Role Derivation

Using Business Role Management to Define Business Roles in Place of Composite Roles

Setting Up Data Segregation in SAP GRC ARA

Keeping Your Mitigation Tables Clean and Accurate with the Invalid Mitigation Report

PART 5

Upgrades

Making Your Roles Compliant with Transaction SU25

Deciding How to Set Up Your Authorization Upgrade

Managing Derived Roles during an Upgrade

Converting a Manually Created Profile into a Role

Avoid Maintaining a Role's Authorization Tree Twice When New Transaction Codes Are Added

Identifying New Transactions in a Role's Menu

Communicating Password Requirement Changes During SAP Upgrades

PART 6

Auditing

Searching for Roles or Users Using Transaction SUIM with Asterisk Searching

Using the Security Audit Log to Manage Your Super Users' Access

Changing the Classification of an Audit Log Message

Configuring the SAP System to Log Activity in the Security Structure

Activating Table Tracing to Log the Details of Changes Made

Viewing All Instances of Profile Parameters

Identifying Alias Transactions to Eliminate Unauthorized System Access

Finding a Specific User Who Has Made Changes to Values

Identifying Query Changes

Protecting and Auditing Your Remote Function Call

PART 7

Security Templates

Using a Spreadsheet to Collect Authorization Data

Defining a Template for Gathering and Defining Your Job Role Data

Defining a Template for Gathering the Organizational Constraints of Job Role Data

Defining a Template for Gathering the Nonorganizational Constraints of Job Role Data

Using Pivot Tables and Authorization Reports to Customize Data for the Reader

PART 8

Continuous Compliance and Governance

Defining Data for User Revalidation

Revalidating Roles and Providing Documentation for Analysis

Making Sure Users Are Assigned Only to the Roles and Transactions They Use

Using Indirect Role Assignment to Simplify User Maintenance and Reporting

Defining Business Owners

Finding Misalignments between Organizational-Level Pop-Ups and Authorization Data in Derived Roles

Finding Manually Created Authorizations in a Role's Authorization Tree

Substituting SAP Queries with Specific Transaction Codes

Using a Query to Find Manually Created Authorizations and Convert them to Roles

Additional Resources

Index

Polecamy również książki

Strony www Białystok Warszawa
801 777 223