SAP Basis Quick check of your SAP security settings with the Xiting Authorizations Management Suite (XAMS) - SAP Corner

Direkt zum Seiteninhalt
Quick check of your SAP security settings with the Xiting Authorizations Management Suite (XAMS)
Database maintenance, scheduling and restoring database backups
It is essential to define the role to be played within the company. STEP 4: DETERMINATION OF THE TARGET GROUP In this step, the target group of the service is defined and described in detail, e.g. by means of a letter. It will also discuss future target groups which may be of interest in the future. By defining a target group within a company, the SAP basis decides for whom the services and IT products should be delivered. It also makes sense to identify and describe future target groups (e.g. specialist areas) within the framework of a transformation of the SAP basis. STEP 5: POSITIONING This step will position the service on the market and also position the competitors in the relevant segment.

Outsourcing services for your SAP Basis operations offers many advantages. As SAP consultants with many years of expertise in plant engineering, shipping operations, insurance companies, upstream and downstream processes in the petroleum industry, retail, banking and many other industries, you benefit from our "all-round experience" from companies of all sizes, from corporate groups as well as medium-sized businesses.
Identification of specific transactions with user assignment
It should be mentioned here that it only makes sense to access the tables by reading the SELECT statement to get a quick view of the results. Using the DBACOCKPIT, it is not possible to create entire table structures using Create Table. For such applications, SAP provides other, better options. Another important point is that once a user has the necessary permissions to use the transaction DBACOCKPIT, it can potentially (with appropriate permissions on the tables) access the entire SAP system. For example, a query can be used to read the entire user table. Therefore, the transaction should always be treated with caution and only awarded to administrators. DBACOCKPIT handles the call control permissions similar to the SE16 / SE16N transaction. When the table is called, the S_TABU_DIS or S_TABU_NAM permission object is checked with a specific activity. This means that only the tables or table permission groups for which the corresponding values in the aforementioned permission objects are assigned can be accessed. You can read more about assigning permissions to individual tables here. In addition, you can save SQL statements that you run once, and run them again at any time to recognise changes in the result set without having to reformulate the SQL statement each time. The editor also allows you to start the query for SQL statements in the background. The result is obtained by calling the transaction SM37, in which the result is output in a spool file.

Mentioning the SUM tool leads us to another part of SAP Basis: system updates and upgrades. Since SAP software receives updates from SAP at regular intervals - in the case of R/3 in the form of SPS (Support Package Stacks) and in the case of S/4HANA in the form of FPS (Feature Pack Stacks) - a large part of an SAP Basis administrator's job is to import these packages into the SAP system.

With "Shortcut for SAP Systems" a tool is available that greatly facilitates some tasks in the SAP basis.

Table deduction USR02 The secure password hash is located in the fifth column of the pictured table deduction with the heading Password hash value.

On www.sap-corner.de you will also find useful information about SAP basis.


Certified SAP consultants enable tailored solutions for any business landscape.
SAP Corner
Zurück zum Seiteninhalt