SAP Basis Backup/restore and disaster recovery - SAP Corner

Direkt zum Seiteninhalt
Backup/restore and disaster recovery
SAP System Management
SWPM - the Software Provisioning Manager integrates the classical tools like sapinst, ehpup, etc. for the maintenance/installation of SAP systems.

In general, SAP operations and all associated activities need to be further professionalised. This includes the documentation of key and mission critical processes and their verification for timeliness and validity. It is also necessary to record and describe the performance of the base by IT service management, as well as techniques such as a RACI matrix to identify and document the responsibilities of the SAP basis.
Flexible response to peak loads
Many companies are struggling with the introduction and use of secinfo and reginfo files to secure SAP RFC gateways. We have developed a generator that supports the creation of the files. This blog post lists two SAP best practices for creating the secinfo and reginfo files to enhance the security of your SAP gateway and how the generator helps you do this. secinfo and reginfo Request generator Option 1: Restrictive procedure In the case of the restrictive solution approach, only in-system programmes are allowed. Therefore, external programmes cannot be used. However, since this is desired, the access control lists must be gradually expanded to include each programme required. Although this procedure is very restrictive, which speaks for safety, it has the very great disadvantage that, in the creation phase, links which are actually desired are always blocked. In addition, the permanent manual activation of individual connections represents a continuous effort. For large system landscapes, this procedure is very complex. Option 2: Logging-based approach An alternative to the restrictive procedure is the logging-based approach. To do this, all connections must be allowed first by the secinfo file containing the content USER=* HOST=* TP=* and the reginfo file contains the content TP=*. During the activation of all connections, a recording of all external programme calls and system registrations is made with the gateway logging. The generated log files can then be evaluated and the access control lists created. However, there is also a great deal of work involved here. Especially with large system landscapes, many external programmes are registered and executed, which can result in very large log files. Revising them and creating access control lists can be an unmanageable task. However, this process does not block any intentional connections during the compilation phase, which ensures the system will run non-disruptively.

Ten years ago, SAP HANA was little more than a promise that made SAP CEO Hasso Plattner's eyes light up. It's hard to imagine that all SAP customers will have completely replaced their Oracle and Microsoft databases in just ten years.

With "Shortcut for SAP Systems" a tool is available that greatly facilitates some tasks in the SAP basis.

Read more This blog post is intended to show what is already possible in the field of Security Automation.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.


The text file in it can be loaded into the Note Assistant with the SNOTE transaction via the Note upload.
SAP Corner
Zurück zum Seiteninhalt