SlideShare a Scribd company logo
1 of 25
Download to read offline
Fiori and S/4HANA
Authorizations
What are the biggest
challenges, and where
do the risks lie?
 S/4HANA and Fiori: Which areas of the SAP security architecture are affected?
 Effects on the authorization concept - revision or redesign?
 Pitfalls during implementation
 Effects on the SOD rules and regulations. What needs to be modernized to stay safe?
 Experiences from accompanied projects
 How can akquinet's expertise and solutions help you to implement a S/4HANA security concept
efficiently, quickly and cost-effectively?
Main topics
- 2 -
Fiori and S/4HANA Authorizations
- 3 -
Technologie
GRC Rule SetProject
Authorization
System
People/
User
TechnologyTechnologie
GRC Rule SetProject
Authorization
System
People/
User
Technology
Often the connections are screwed together ...
S/4HANA / Fiori: Frontend-Server
Embedded FES Deployment Central Hub FES Deployment
Architecture options
- 4 -
The embedded deployment of the frontend server practically serves as a starting point for getting to know the
Fiori gateway architecture or for small deployment scenarios.
For productive operation, SAP recommends the "Central Hub Deployment" option.
S/4HANA / Fiori: Frontend Server (FES)
Recommended Architecture
- 5 -
Advantages of a dedicated Frontend Server:
 Only one frontend server needs to be installed and maintained.
 The software lifecycle of the frontend server is decoupled from the backend server. (Patching)
 The implementation of innovations in the areas of SAP Fiori UIs and UI can be carried out
independently of the backend server.
 Security requirements cannot be implemented more than once. (System Hardening)
 A dedicated frontend server is easier to integrate into network zones (e.g. DMZ).
 Greater complexity and investment in scale-up of multiple Fiori FES.
Fiori and S/4HANA Authorizations
Often the connections are screwed together ...
- 6 -
Technologie
GRC Rule SetProject
Authorization
System
People/
User
Technology
SAP ECC vs. S/4HANA: Access Levels
Users need permissions on up to three access levels.
- 7 -
What are the changes for S/4HANA Authorizations?
Changes on application level*
- 8 -
*KennzahlenbasierenaufS/4HANA1709
Obsolete transaction codes 4.147
Replaced transaction codes Replaced SAPGui TC 318
SAPGui TC with Fiori-only replacement 18
Examples TC BP replaces 54 TC in the areas of
debitor and creditor master data
TC CJ20N replaces 31 TC in the area of
project management
S/4HANA: Application Access
Example 1: Transactional App „Posting with Clearing“
- 9 -
S/4HANA: Application Access f
Example 2: Analytical App „Financial Close Dashboard“
- 10 -
S/4HANA / Fiori: Authorization Structures
- 11 -
Consequences for the authorization concept
Revise or redesign?
- 12 -
Revise
 Brownfield Approach by system conversion
 Current authorization and role concept has
high quality and is "unobstructed
 Minimal use of Fiori
(e.g. compulsory Fiori App bank management)
Consequences for the authorization concept
Revise or redesign?
Redesign
 Greenfield Approach
 Brownfield Approach, if:
 Comprehensive use of Fiori
 Current authorization and role concept
ist due for re-design
- 13 -
No plug-and-play!!
SAP S/4HANA: transaction changes
- 14 -
SAP S/4HANA – important new authorization objects
- 15 -
Fiori and S/4HANA Authorizations
Often the connections are screwed together ...
- 16 -
Technologie
GRC Rule SetProject
Authorization
System
People/
User
Technology
 S/4HANA is not ERP!
Many known transaction codes have changed in content and perform additional or different
authorization checks.
 Compared to SAP ECC, 16,000 transaction codes have been added.
 Well-known transactions were often either transferred to other transactions or Fiori apps or
deleted completely. (Keywords: Business Partner, Bank Account Management, Credit
Management)
 In addition to traditional transactions, the OData services on which the Fiori apps are based
must also be included in SOD processes. Attention: the hash values of the TADIR services may
change from release to release.
 Due to the SAP recommendation for hub implementation of the SAP Gateway, SOD analyses will
generally be cross-system in the future.
Effects on the SOD rule set
What needs to be modernised? In a nutshell: almost everything
General
- 17 -
 Hundreds of new critical basic transactions (including namespace /UI2/) are not taken into account in
conventional SOD sets of rules.
 S_TABU_DIS, S_TABU_CLI, etc. are no longer sufficient to protect against unauthorized access. To
protect access to CDS views (Core Data Services), you may need to create your own authorization
objects and include them in the SOD set of rules.
Effects on the SOD rule set
What needs to be modernised?
Sensitive Access (single critical authorizations)
- 18 -
Effects on the SOD rule set
What needs to be modernised?
Segregation of Duties
 The changed business processes of S/4HANA must be taken into account in the SOD set of
rules.
 The numerous discontinued / transferred transactions must be updated in the set of rules.
 OData services behind Fiori Apps must be mapped to SOD processes.
- 19 -
1. Identify the Fiori apps in-scope of your application architecture
2. Assign the Fiori apps to transaction codes.
3. Assign the Fiori apps to processes (business functions).
4. Identify the processes of your SOD set of rules that are to be created/changed.
5. Identify relevant services for Fiori apps
6. Check and update SU24 values for the services
7. Update your rules and regulations
Defining a S/4HANA authorization check rule set
- 20 -
Fiori and S/4HANA Authorizations
Often the connections are screwed together ...
- 21 -
Technologie
GRC Rule SetProject
Authorization
System
People/
User
Technology
How can we support you?
Our experience = Your Gain!
 Benefit from our comprehensive knowledge in the areas of ECC and S/4HANA authorization.
 With SAST Safe Go-Live Management, we have created an innovative solution to make the
authorization structures behind Fiori Apps (OData) transparent both through user tracing
and through code inspection.
- 22 -
Benefit from our new "painkiller" for authorization design and SOD rule creation.!
Take Home Messages
- 23 -
1. Gain Fiori experience as early as possible before implementing S/4HANA.
Learning the design and handling of the SAP frontend (gateway) is a key to success.
2. Implement a sandbox system to "test drive" for IT and users.
3. Involve those affected by the project as participants at an early stage.
4. Your departments need a strong, leading hand in technology selection.
Make your users think. Avoid “wishing well" situations.
5. Think early about the target image of your SAP S/4HANA architecture and
the effects on the first steps.
6. Create your S/4HANA SOD matrix before creating the first role!
Without defined SoD requirements, your new authorization roles will be risky again.
7. Be careful with catalogs and groups! Align Fiori catalogs, groups and roles with each other.
Note…
„The implementation of S/4HANA
and Fiori without intensive planning
and preparation to the dark side
leads.
Beware of the hatred of
administrators and users you must,
young Jedi.“
- 24 -
Copyright:WaltDisneyMotionPicturesGroup,Inc.
DO YOU HAVE ANY QUESTIONS?
WE ANSWER. FOR SURE.
RALF KEMPF
CTO SAST SOLUTIONS
 More than 25 years of experience in SAP security services and software
development
 Specializing in security analysis and testing of complex SAP systems
 Architect of the SAST SUITE, the Security & Compliance Software for SAP systems
Email: sast@akquinet.com
Web: www.sast-solutions.com
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.

More Related Content

What's hot

Mastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
Mastering SAP Monitoring - SAP SLT & RFC Connection MonitoringMastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
Mastering SAP Monitoring - SAP SLT & RFC Connection MonitoringLinh Nguyen
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC FrameworkHarish Sharma
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 
Selecting SAP S/4 HANA- Digital Core migration strategy - Greenfield vs Brow...
Selecting SAP S/4 HANA- Digital Core migration strategy -  Greenfield vs Brow...Selecting SAP S/4 HANA- Digital Core migration strategy -  Greenfield vs Brow...
Selecting SAP S/4 HANA- Digital Core migration strategy - Greenfield vs Brow...Akash Agrawal
 
SAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementationSAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementationBluefin Solutions
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricksJasbir Khanuja
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access ControlNasir Gondal
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceTLI GrowthSession
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers Verbella CMG
 

What's hot (20)

What is sap security
What is sap securityWhat is sap security
What is sap security
 
Mastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
Mastering SAP Monitoring - SAP SLT & RFC Connection MonitoringMastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
Mastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
SAP Implementation Phase!!
SAP Implementation Phase!!SAP Implementation Phase!!
SAP Implementation Phase!!
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
SAP Security interview questions
SAP Security interview questionsSAP Security interview questions
SAP Security interview questions
 
How to analyzing sap critical authorizations
How to analyzing sap critical authorizationsHow to analyzing sap critical authorizations
How to analyzing sap critical authorizations
 
SAP BPC Embedded for S/4 HANA
SAP BPC Embedded for S/4 HANASAP BPC Embedded for S/4 HANA
SAP BPC Embedded for S/4 HANA
 
Selecting SAP S/4 HANA- Digital Core migration strategy - Greenfield vs Brow...
Selecting SAP S/4 HANA- Digital Core migration strategy -  Greenfield vs Brow...Selecting SAP S/4 HANA- Digital Core migration strategy -  Greenfield vs Brow...
Selecting SAP S/4 HANA- Digital Core migration strategy - Greenfield vs Brow...
 
sap fiori architecture
sap fiori architecturesap fiori architecture
sap fiori architecture
 
SAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementationSAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementation
 
Fiori for s4 hana troubleshooting tips and tricks
Fiori for s4 hana  troubleshooting tips and tricksFiori for s4 hana  troubleshooting tips and tricks
Fiori for s4 hana troubleshooting tips and tricks
 
Moving to SAP S/4HANA
Moving to SAP S/4HANAMoving to SAP S/4HANA
Moving to SAP S/4HANA
 
SAP GRC 10 Access Control
SAP GRC 10 Access ControlSAP GRC 10 Access Control
SAP GRC 10 Access Control
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
 

Similar to Fiori and S/4 authorizations: What are the biggest challenges, and where do the risks lie? [Webinar]

Fisker Automotive 2015 UX1880 ASUG SAPPHIRE
Fisker Automotive 2015 UX1880 ASUG SAPPHIREFisker Automotive 2015 UX1880 ASUG SAPPHIRE
Fisker Automotive 2015 UX1880 ASUG SAPPHIREPeter Spielvogel
 
Webinar- SAP Fiori Deep Dive 1.0- Prosoft Technology Group
Webinar- SAP Fiori Deep Dive 1.0- Prosoft Technology GroupWebinar- SAP Fiori Deep Dive 1.0- Prosoft Technology Group
Webinar- SAP Fiori Deep Dive 1.0- Prosoft Technology GroupJimmy Singh Mathur
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Salesforce Partners
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...akquinet enterprise solutions GmbH
 
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP HANA Cloud Platform
 
Sap success factors quick guide
Sap success factors quick guideSap success factors quick guide
Sap success factors quick guideSushil Rathi
 
SAP Fiori Mobility Applications
SAP  Fiori Mobility ApplicationsSAP  Fiori Mobility Applications
SAP Fiori Mobility ApplicationsWise Men
 
SAP S4HANA : Learn From Our Implementation Journey
SAP S4HANA : Learn From Our Implementation JourneySAP S4HANA : Learn From Our Implementation Journey
SAP S4HANA : Learn From Our Implementation JourneyAnup Lakra
 
SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...
SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...
SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...SAP HANA Cloud Platform
 
1571 Delek US Holdings - Increased Adaptatability with Fiori V3.0
1571 Delek US Holdings - Increased Adaptatability with Fiori V3.01571 Delek US Holdings - Increased Adaptatability with Fiori V3.0
1571 Delek US Holdings - Increased Adaptatability with Fiori V3.0Praveen Sabbavarapu
 
Transforming the service layer telus-sigma
Transforming the service layer telus-sigmaTransforming the service layer telus-sigma
Transforming the service layer telus-sigmaSigma Systems
 
I T E007 Warner 091807
I T E007  Warner 091807I T E007  Warner 091807
I T E007 Warner 091807Dreamforce07
 
SAP - Mayank Sharma 11+ years
SAP - Mayank Sharma 11+ yearsSAP - Mayank Sharma 11+ years
SAP - Mayank Sharma 11+ yearsMayank Sharma
 
SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...
SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...
SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...SAP HANA Cloud Platform
 

Similar to Fiori and S/4 authorizations: What are the biggest challenges, and where do the risks lie? [Webinar] (20)

Fisker Automotive 2015 UX1880 ASUG SAPPHIRE
Fisker Automotive 2015 UX1880 ASUG SAPPHIREFisker Automotive 2015 UX1880 ASUG SAPPHIRE
Fisker Automotive 2015 UX1880 ASUG SAPPHIRE
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
Webinar- SAP Fiori Deep Dive 1.0- Prosoft Technology Group
Webinar- SAP Fiori Deep Dive 1.0- Prosoft Technology GroupWebinar- SAP Fiori Deep Dive 1.0- Prosoft Technology Group
Webinar- SAP Fiori Deep Dive 1.0- Prosoft Technology Group
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
How to Implement Fiori Central Hub 1610
How to Implement Fiori Central Hub 1610How to Implement Fiori Central Hub 1610
How to Implement Fiori Central Hub 1610
 
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
 
Succesfactors demo
Succesfactors demoSuccesfactors demo
Succesfactors demo
 
Sap success factors quick guide
Sap success factors quick guideSap success factors quick guide
Sap success factors quick guide
 
SAP Fiori Mobility Applications
SAP  Fiori Mobility ApplicationsSAP  Fiori Mobility Applications
SAP Fiori Mobility Applications
 
SAP S4HANA : Learn From Our Implementation Journey
SAP S4HANA : Learn From Our Implementation JourneySAP S4HANA : Learn From Our Implementation Journey
SAP S4HANA : Learn From Our Implementation Journey
 
PaaS Decision Matrix
PaaS Decision MatrixPaaS Decision Matrix
PaaS Decision Matrix
 
SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...
SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...
SAP D-Code/TechEd 2014|DEV203|Extending SuccessFactors using SAP HANA Cloud P...
 
Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2
 
1571 Delek US Holdings - Increased Adaptatability with Fiori V3.0
1571 Delek US Holdings - Increased Adaptatability with Fiori V3.01571 Delek US Holdings - Increased Adaptatability with Fiori V3.0
1571 Delek US Holdings - Increased Adaptatability with Fiori V3.0
 
Transforming the service layer telus-sigma
Transforming the service layer telus-sigmaTransforming the service layer telus-sigma
Transforming the service layer telus-sigma
 
I T E007 Warner 091807
I T E007  Warner 091807I T E007  Warner 091807
I T E007 Warner 091807
 
Thillipan
ThillipanThillipan
Thillipan
 
SAP - Mayank Sharma 11+ years
SAP - Mayank Sharma 11+ yearsSAP - Mayank Sharma 11+ years
SAP - Mayank Sharma 11+ years
 
SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...
SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...
SAP TechEd 2015 | DEV109 | Extending Cloud Solutions from SAP using SAP HANA ...
 

More from akquinet enterprise solutions GmbH

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...akquinet enterprise solutions GmbH
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...akquinet enterprise solutions GmbH
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...akquinet enterprise solutions GmbH
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...akquinet enterprise solutions GmbH
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]akquinet enterprise solutions GmbH
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...akquinet enterprise solutions GmbH
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...akquinet enterprise solutions GmbH
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]akquinet enterprise solutions GmbH
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]akquinet enterprise solutions GmbH
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...akquinet enterprise solutions GmbH
 

More from akquinet enterprise solutions GmbH (20)

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Fiori and S/4 authorizations: What are the biggest challenges, and where do the risks lie? [Webinar]

  • 1. Fiori and S/4HANA Authorizations What are the biggest challenges, and where do the risks lie?
  • 2.  S/4HANA and Fiori: Which areas of the SAP security architecture are affected?  Effects on the authorization concept - revision or redesign?  Pitfalls during implementation  Effects on the SOD rules and regulations. What needs to be modernized to stay safe?  Experiences from accompanied projects  How can akquinet's expertise and solutions help you to implement a S/4HANA security concept efficiently, quickly and cost-effectively? Main topics - 2 -
  • 3. Fiori and S/4HANA Authorizations - 3 - Technologie GRC Rule SetProject Authorization System People/ User TechnologyTechnologie GRC Rule SetProject Authorization System People/ User Technology Often the connections are screwed together ...
  • 4. S/4HANA / Fiori: Frontend-Server Embedded FES Deployment Central Hub FES Deployment Architecture options - 4 -
  • 5. The embedded deployment of the frontend server practically serves as a starting point for getting to know the Fiori gateway architecture or for small deployment scenarios. For productive operation, SAP recommends the "Central Hub Deployment" option. S/4HANA / Fiori: Frontend Server (FES) Recommended Architecture - 5 - Advantages of a dedicated Frontend Server:  Only one frontend server needs to be installed and maintained.  The software lifecycle of the frontend server is decoupled from the backend server. (Patching)  The implementation of innovations in the areas of SAP Fiori UIs and UI can be carried out independently of the backend server.  Security requirements cannot be implemented more than once. (System Hardening)  A dedicated frontend server is easier to integrate into network zones (e.g. DMZ).  Greater complexity and investment in scale-up of multiple Fiori FES.
  • 6. Fiori and S/4HANA Authorizations Often the connections are screwed together ... - 6 - Technologie GRC Rule SetProject Authorization System People/ User Technology
  • 7. SAP ECC vs. S/4HANA: Access Levels Users need permissions on up to three access levels. - 7 -
  • 8. What are the changes for S/4HANA Authorizations? Changes on application level* - 8 - *KennzahlenbasierenaufS/4HANA1709 Obsolete transaction codes 4.147 Replaced transaction codes Replaced SAPGui TC 318 SAPGui TC with Fiori-only replacement 18 Examples TC BP replaces 54 TC in the areas of debitor and creditor master data TC CJ20N replaces 31 TC in the area of project management
  • 9. S/4HANA: Application Access Example 1: Transactional App „Posting with Clearing“ - 9 -
  • 10. S/4HANA: Application Access f Example 2: Analytical App „Financial Close Dashboard“ - 10 -
  • 11. S/4HANA / Fiori: Authorization Structures - 11 -
  • 12. Consequences for the authorization concept Revise or redesign? - 12 -
  • 13. Revise  Brownfield Approach by system conversion  Current authorization and role concept has high quality and is "unobstructed  Minimal use of Fiori (e.g. compulsory Fiori App bank management) Consequences for the authorization concept Revise or redesign? Redesign  Greenfield Approach  Brownfield Approach, if:  Comprehensive use of Fiori  Current authorization and role concept ist due for re-design - 13 - No plug-and-play!!
  • 14. SAP S/4HANA: transaction changes - 14 -
  • 15. SAP S/4HANA – important new authorization objects - 15 -
  • 16. Fiori and S/4HANA Authorizations Often the connections are screwed together ... - 16 - Technologie GRC Rule SetProject Authorization System People/ User Technology
  • 17.  S/4HANA is not ERP! Many known transaction codes have changed in content and perform additional or different authorization checks.  Compared to SAP ECC, 16,000 transaction codes have been added.  Well-known transactions were often either transferred to other transactions or Fiori apps or deleted completely. (Keywords: Business Partner, Bank Account Management, Credit Management)  In addition to traditional transactions, the OData services on which the Fiori apps are based must also be included in SOD processes. Attention: the hash values of the TADIR services may change from release to release.  Due to the SAP recommendation for hub implementation of the SAP Gateway, SOD analyses will generally be cross-system in the future. Effects on the SOD rule set What needs to be modernised? In a nutshell: almost everything General - 17 -
  • 18.  Hundreds of new critical basic transactions (including namespace /UI2/) are not taken into account in conventional SOD sets of rules.  S_TABU_DIS, S_TABU_CLI, etc. are no longer sufficient to protect against unauthorized access. To protect access to CDS views (Core Data Services), you may need to create your own authorization objects and include them in the SOD set of rules. Effects on the SOD rule set What needs to be modernised? Sensitive Access (single critical authorizations) - 18 -
  • 19. Effects on the SOD rule set What needs to be modernised? Segregation of Duties  The changed business processes of S/4HANA must be taken into account in the SOD set of rules.  The numerous discontinued / transferred transactions must be updated in the set of rules.  OData services behind Fiori Apps must be mapped to SOD processes. - 19 -
  • 20. 1. Identify the Fiori apps in-scope of your application architecture 2. Assign the Fiori apps to transaction codes. 3. Assign the Fiori apps to processes (business functions). 4. Identify the processes of your SOD set of rules that are to be created/changed. 5. Identify relevant services for Fiori apps 6. Check and update SU24 values for the services 7. Update your rules and regulations Defining a S/4HANA authorization check rule set - 20 -
  • 21. Fiori and S/4HANA Authorizations Often the connections are screwed together ... - 21 - Technologie GRC Rule SetProject Authorization System People/ User Technology
  • 22. How can we support you? Our experience = Your Gain!  Benefit from our comprehensive knowledge in the areas of ECC and S/4HANA authorization.  With SAST Safe Go-Live Management, we have created an innovative solution to make the authorization structures behind Fiori Apps (OData) transparent both through user tracing and through code inspection. - 22 - Benefit from our new "painkiller" for authorization design and SOD rule creation.!
  • 23. Take Home Messages - 23 - 1. Gain Fiori experience as early as possible before implementing S/4HANA. Learning the design and handling of the SAP frontend (gateway) is a key to success. 2. Implement a sandbox system to "test drive" for IT and users. 3. Involve those affected by the project as participants at an early stage. 4. Your departments need a strong, leading hand in technology selection. Make your users think. Avoid “wishing well" situations. 5. Think early about the target image of your SAP S/4HANA architecture and the effects on the first steps. 6. Create your S/4HANA SOD matrix before creating the first role! Without defined SoD requirements, your new authorization roles will be risky again. 7. Be careful with catalogs and groups! Align Fiori catalogs, groups and roles with each other.
  • 24. Note… „The implementation of S/4HANA and Fiori without intensive planning and preparation to the dark side leads. Beware of the hatred of administrators and users you must, young Jedi.“ - 24 - Copyright:WaltDisneyMotionPicturesGroup,Inc.
  • 25. DO YOU HAVE ANY QUESTIONS? WE ANSWER. FOR SURE. RALF KEMPF CTO SAST SOLUTIONS  More than 25 years of experience in SAP security services and software development  Specializing in security analysis and testing of complex SAP systems  Architect of the SAST SUITE, the Security & Compliance Software for SAP systems Email: sast@akquinet.com Web: www.sast-solutions.com © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.