SAP Basis Technical implementation and typical tools in the SAP Basis environment - SAP Corner

Direkt zum Seiteninhalt
Technical implementation and typical tools in the SAP Basis environment
It is possible to specify a trace level for each rule in the ACL file to monitor each communication channel individually. It can be used with SNC without any further configuration. The use of the file is controlled by the gw/acl_file parameter by simply setting it to the appropriate file name. Use of external programmes If an external programme wants to communicate with your SAP system, it must first register at the gateway. The programmes which this is approved are controlled by the reginfo ACL file. This defines rules that allow or prohibit certain programmes. The syntax of the file allows you to define not only the name of the programme, but also the host on which the programme runs and hosts that can use and exit the programme. The gw/reg_info parameter must be set to use this file. In addition, there is the ACL file secinfo, which allows to configure which users can start an external programme. This defines rules that allow certain usernames from the SAP system to use certain external programmes. In addition, you can also define the hosts on which these programmes will run. For example, it is possible to allow a user to run the programme "BSP" on the host "XYZ", but not on the host "ABC". This file is controlled by the gw/sec_info parameter. Using the gateway as a proxy Since the gateway of your SAP system can also serve as a proxy server, the prxyinfo ACLDatei should also be activated via the gw/prxy_info parameter. Suppose you have 3 SAP systems in your network: SRC, TRG and PRX. If SRC cannot communicate directly with TRG, but both with PRX it would be possible to use the gateway of the PRX system as a proxy server, i.e. to communicate via it. So, in order to prevent this from happening to everyone, this property should be urgently restricted. As with the other ACL files, rules are defined which hosts can communicate with which hosts via the gateway. The syntax of the different ACL files may vary depending on the release level. It is therefore advisable to read them in the appropriate SAP documentation before activating the ACL files. You can also find more support for using ACL files in the SAP Community Wiki.

The following folders on the system will then be completely deleted: C:\Program Files (x86)\Common Files\SAP Shared\BW delete C:\Program Files (x86)\Delete SAP C:\Program Files\SAP This completes the CleanUp phase. Install new version SAP GUI and Bex (BI Addon) The first step is to install SAP GUI and Business Explorer (Bex). Please select and install the following in the installer (see screenshot): SAP GUI Suite under SAP GUI for Windows (=Frontend) Business Explorer complete The progress bar often stays at about 93%. It takes a few minutes to complete the installation.
A user name without a restricted character set can be a security risk. Therefore, it is advisable that you restrict the character set of the user ID. In this article you will learn where the dangers lie if you do not limit the user ID. I also explain how to eliminate this security risk.

A positive aspect of standardisation and automation is the increase in the quality of tasks, since manual errors can be almost excluded. It also increases the speed at which certain tasks can be performed. This is accompanied by a reduction in the proportion of administrative activity and thus in the proportion of the operation of the system landscape.

With "Shortcut for SAP Systems" a tool is available that greatly facilitates some tasks in the SAP basis.

Application programs pull the data they need from the database.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page:

The SAP Basis consultant should be able to perform the following tasks.
SAP Corner
Zurück zum Seiteninhalt