SAP Basis Show table of contents - SAP Corner

Direkt zum Seiteninhalt
Show table of contents
Migration and management of cloud-based solutions
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.

Faster problem solutions: With an SAP service provider, you usually get faster solutions to problems that arise. With years of experience, experts can draw on a pool of solutions and know what is most efficient and best in each situation.
We support you in the following tasks:
Of course, the SAP consultant remains in the foreground as a person and is the figurehead for our services. However, where it makes sense, they are supported by customized tools.

SAP's client concept enables a SAP system to be split into several logical sub-systems - clients. These subsystems can be used independently and in isolation as separate systems. But how should non-client transactions be treated? How can you prevent one client from accessing the other and why should you want to prevent that? In this blog post, I will answer these questions and discuss some negative examples. Why is it important to consider independent transactions separately? Imagine that every one of your employees is allowed to create or change a client in the production system, or worse, both. Creating and modifying a client in the production system is authorised and documented - you wonder what could possibly go wrong? The risk in this case is a loss of integrity of system and data, loss of confidentiality: With each new client, Superuser SAP* lives up to its comprehensive, cross-client rights and the assigned standard password.

"Shortcut for SAP Systems" simplifies tasks in the area of the SAP basis and complements missing functions of the standard.

There are two types of users: 1) Default (limited): With this type of user, there are different access methods to the database.

Some useful tips about SAP basis can be found on www.sap-corner.de.


As a reader of our blog, you are certainly interested in tricks and tricks that will make your SAP system easier to handle.
SAP Corner
Zurück zum Seiteninhalt