www.saponlinetraining.in is providing
sap security online training contact us:+91-9533456356,info@spectoittraining.com,
By Real Time Experts in USA, Canada, Australia,singapore,southafrica,uk,india,malaysia,dubai.
sap security certification and placements full courses details please visit our
website:www.saponlinetraining.in,For any further details please
contact India +91-9533456356.
http://spectoittraining.com/
http://www.saponlinetraining.in/sap-security-online-training/
4. What is Security?
Security concept is same around the globe like in your normal life, security
means removing or restricting unauthorized access to your belongings. For
example your Car, laptop or cared cards etc
IT Security?
Information security (sometimes shortened to InfoSec) is the practice
defending information from unauthorized access, use, disclosure,
disruption,
modification, perusal, inspection, recording or destruction. It is a general
term
that can be used regardless of the form the data may take (electronic,
physical,
etc...)
SAP Security?
In the same context of InfoSec. SAP security have the same meaning… or in
other words - who can do what in SAP?
www.spectoittraining.com
5. Building Blocks
User Master
Record Roles
Profiles Authorization
Objects
www.spectoittraining.com
6. User Master Record?
A User initially has no access in SAP
When we create access in system it defines UMR User Master Record
information includes:
Name, Password, Address, User type, Company information
User Group
Roles and Profiles
Validity dates (from/to)
User defaults (logon language, default printer, date format, etc)
User Types: Dialog – typical for most users System – cannot be used
for dialog login, can communicate between systems and start
background jobs Communications Data – cannot be used for dialog
login, can communicate between systems but cannot start background
jobs Reference – cannot log in, used to assign additional
Authorizations
www.spectoittraining.com
7. Roles and Profiles Roles is group of tcode (s), which is used to
perform a specific business task.
Each role requires specific privileges to perform a function in
SAP that is called AUTHORIZATIONS There are 3 types of
Roles:
Single – an independent Role
Derived – has a parent and differs only in Organization Levels.
Maintain Transactions, Menu, Authorizations only at the parent
level
Composite – container that contains one or more Single or
Derived Roles
www.spectoittraining.com
8. Authorization Objects
• Authorization Objects are the keys to SAP security
• When you attempt actions in SAP the system checks to
see whether you have the appropriate Authorizations
• The same Authorization Objects can be used by
different Transactions
www.spectoittraining.com
9. User Buffer?
• When a User logs into the system, all of the Authorizations that
the User has are loaded into a special place in memory called the
User Buffer
• As the User attempts to perform activities, the system checks
whether the user has the appropriate Authorization Objects in
the User Buffer.
• You can see the buffer in Transaction .
www.spectoittraining.com
10. Executing a Transaction (Authorization Checks)
1) Does the Transaction exist? All Transactions have an entry in table
TSTC
2) Is the Transaction locked? Transactions are locked using
Transaction SM01 Once locked, they cannot be used in any client
3) Can the User start the Transaction? Every Transaction requires that
the user have the Object S_TCODE=Transaction Name Some
Transactions also require another Authorization Object to start
(varies depending on the Transaction)
4) What can the User do in the Transaction? The system will check to
see if the user has additional Authorization Objects as necessary
www.spectoittraining.com