SAP Authorizations What to do when the auditor comes - Part 1: Processes and documentation - SAP Corner

Direkt zum Seiteninhalt
What to do when the auditor comes - Part 1: Processes and documentation
Analysis and reporting tool for SAP SuccessFactors ensures order and overview
You can limit the recording to a specific user. You can also use the trace to search only for permission errors. The evaluation is similar to the evaluation of the system trace in the transaction ST01. In transaction STAUTHTRACE, however, you can also evaluate for specific authorization objects or for specific permission check return codes (i.e. after positive or negative permission checks). You can also filter multiple entries.

All external services with their suggested values can be viewed or maintained in the transaction SU24. Access to external services or all CRM functions and data within CRM functions is realised via PFCG roles. To create these PFCG roles, you must first create a role menu. To do this, run the report CRMD_UI_ROLE_PREPARE. You can specify either the name of the CRM Business Role (User Role) or the name of the assigned PFCG role. It is also important that you specify the language in which the PFCG role will be maintained in the appropriate field.
Mitigating GRC risks for SAP systems
For the configuration, you must first enable encryption and, if necessary, signing in the SAPConnect administration. To do this, go to Settings > Outgoing Messages > Settings on the Signing & Encryption tab of the SCOT transaction. Note that the activation only enables the encryption or signature of emails; whether this is actually done always controls the sending application.

Thanks to the new feature provided with the Support Package mentioned in SAP Note 1847663, it is possible to use trace data from the privilege trace in the SU24 transaction for suggestion value maintenance. The system trace that you can call through the ST01 transaction or the STAUTHTRACE transaction (see also Tip 31, "Optimise Trace Evaluation") is a short-term, client-dependent trace that you can restrict to users or applications.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

The results obtained from this form an excellent basis for estimating the project scope and implementation timeframe.

You can also find some useful tips from practice on the subject of SAP authorizations on the page www.sap-corner.de.


In this case, you also need an archiving concept for other key change document data.
SAP Corner
Zurück zum Seiteninhalt