Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Beginners' Guide to SAP Security and Authorizations

Posted By: AlenMiler
Beginners' Guide to SAP Security and Authorizations

Beginners' Guide to SAP Security and Authorizations by Tracy Juran
English | Apr. 29, 2016 | ISBN: 1508635390 | 130 Pages | AZW3/MOBI/EPUB/PDF (conv) | 20.88 MB

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create users and assign roles. Get tips on leveraging the profile generator transaction PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed.

- Basic architecture of SAP Security and Authorizations
- Learn how to create users and assign roles
- Introduction to GRC Access Control
- Troubleshoot common security and authorization pain points