NW ABAP User Administration and Authorization
47 Blog Posts
37 Contributors
-
Motivation: In my earlier blog, Consuming a Business Technology Platform service from an S/4 HANA system using SM59 destination with OAuth, I covered what it takes to connect to an SAP BTP service from S/4HANA on-premise using OAuth. Here, we look... Read More »0Comments4Likes
-
Scenario Description In this blog, I present an introduction to OAuth and explain how to implement and configure the consumption of an OAuth-enabled service provided by the SAP Business Technology Platform from an SAP S/4HANA system on release 2021... Read More »4Comments9Likes
-
Greetings, I am glad to inform you about a significant development in the RedRays Security Platform for the ABAP stack. We have created a new module that effectively deals with the pressing concern of password security in today’s digital... Read More »0Comments2Likes
-
SAP servers are often connected to each other to facilitate communication and transfer of data between systems. This interconnectivity allows for the seamless exchange of information, making it easier to manage business processes and decision-making... Read More »2Comments0Likes
-
Edition 1- SAP Security Role Redesigning WHAT IS ROLE REDESIGNING? A Role redesign, also sometimes referred to as security redesign or role remediation, refers to significant changes to SAP roles that impact the authorizations of SAP users.It is... Read More »1Comment4Likes
-
1 Use-case This methodology is especially useful to perform SAP role redesign (small or large scale) where you choose to implement new SAP role(s) for your productive SAP entity, to replace an existing role concept with a new improved... Read More »3Comments9Likes
-
The technical background and rules for the merge process of authorizations are documented in SAP note 113290 – PFCG: Merge process for authorization data maintenance To illustrate the described rules, here are some simple examples,... Read More »1Comment9Likes
-
The implementation of additional mitigating controls is a frequent response from the company management in order to limit the risk of excessive (redundant or unnecessary) authorizations in ERP (SAP) systems. Is it a good way to eliminate the... Read More »3Comments7Likes
-
How you can leverage new functionality to improve your security role build in SAP S/4HANA. Avoid CHANGED. MANUAL by Exception. MAINTAINED is OK. Strive for STANDARD. For as long as I’ve been building application security... Read More »8Comments23Likes
-
Dada a criticidade das informações que mantém, a camada de autorizações relacionada aos componentes FI/CO, estes que, transacionam informações estratégicas e sensíveis, é amplamente discutida. O estabelecimento de controles, tal qual, SOD,... Read More »1Comment2Likes