SAP Basis Use of the Security Audit Log - SAP Corner

Direkt zum Seiteninhalt
Use of the Security Audit Log
Handling SAP day-to-day business such as administration, maintenance and configuration of your SAP systems
We set about creating detailed playbooks for all common scenarios - installations, portals, upgrades and migrations - and platforms. Today, hardly any consulting firm can do without them, but in my early days they gave us a decisive edge over the competition and earned us many satisfied customers.

Before SAP HANA was released, there was no SAP database - you had to install SAP ERP (or the application you were using) on a third-party database, such as Oracle or SQL Server. SAP developed the HANA database to fully leverage the power of SAP's next-generation S/4 software.
What is "SAP Basis" and what are the tasks of "SAP Basis administrators"?
It is therefore not unusual for the authorisation allocations to be regularly reviewed in the course of a revision or by external auditors. This is a very laborious process with SAPS standard tools. In this scenario, an authorisation administrator would first have to manually assign each employee to a specific manager and determine their roles. After that, these roles should be exported from the system (for example, to an Excel file) and then submitted to the supervisor so that he can decide whether the role assignment is appropriate or not.

This presentation takes place via a graphical user interface (GUI). This is where users read required information and enter new data into the system.

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

This requires careful planning and anticipation of long-term trends.

If you want to get more information about SAP basis, visit the website www.sap-corner.de.


Now all the roles that have been copied previously are inserted here.
SAP Corner
Zurück zum Seiteninhalt