SAP Basis SAP Remote Support - SAP Corner

Direkt zum Seiteninhalt
SAP Remote Support
TABLE LOGGING AND TABLE PROTECTION
The comprehensive analysis provides the pattern and roadmap for the next steps. This also includes the right sizing, the selection of the monitoring concept and the appropriate deployment model, i.e. on-premise, cloud or hybrid cloud. Only with this planning can you ultimately achieve the desired goal - with transparent costs.

Let me show you how EasyReCert can simplify this process. Automatic representation of employees & role assignment Each user of the application automatically receives the employees assigned to him. In the first step, the user verifies the assignment of the employees assigned to him. In the second step, the user is shown the roles of his employees. It is now possible to mark the assignment of the role as correct or incorrect. Understandable explanation of the roles Often roles have no talking names and for the decider it is not clear which specific permissions are behind a role. The tool offers the possibility to provide a description for each role, which is available by pop-in. Looking up which role has which permissions and which is meant for which is completely omitted. Flags & Criticality The tool offers in its options the possibility to set flags for critical roles and highlight them in particular. At a glance, the decision-makers see that one of their employees has a critical role and can examine it carefully. Since roles are classified differently in each company, you are completely free to decide which roles you want to consider critical. Roll Whitelist Do you want to exclude certain roles from the audit? Or do you want to test only critical roles? The tool offers you a whitelist function for this. This whitelist allows you to include roles that you do not want to check in the recertification process. So you completely decide which roles the tool should take into account. Logging of the results The results of the tests are logged via the application log and can be viewed both by SAP standard means and directly by the tool. It is also possible to export the audit logs or add optional comments to the logs later.
User name with restrictions - how?
The database layer manages all data in the R/3 System. It contains the database management system (DBMS) and the actual data.

A first important step was the introduction of playbooks to professionalize our work. Back then, SAP installation manuals were real tomes with hundreds of pages that often went around in circles and were anything but easy to understand....

For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.

More information about the generator can be found here.

If you want to get more information about SAP basis, visit the website www.sap-corner.de.


Note: Logging user activity must be aware of the users concerned! Configure the SAL only for technical users or in consultation with users / works council / etc.
SAP Corner
Zurück zum Seiteninhalt