SlideShare a Scribd company logo
1 of 11
Download to read offline
How to convert
your ERP roles
to SAP S/4HANA!
SAST Role Conversion Service
WELCOME!
Introducing your host today:
- 2 -
PAUL MICHAELIS
SAP S/4HANA Consultant
Tel: +49 40 88173-2760
Email: Paul.Michaelis@akquinet.de
Web: sast-solutions.com
AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Fon: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: www.sast-solutions.com
 There are many different sources of information.
 The creation of conversion data records is complex (with extensive SAP Simplification List).
 There is inconsistency between the different S/4HANA releases.
 A significant proportion of the preparatory work and analyses is done manually.
 Uncertainty when using old ERP roles in a S/4HANA system:
 Which transactions are obsolete or need to be replaced?
 How do you recognize suitable Fiori Apps for the roles?
 How do you comply with the authorization concept?
How do you convert of SAP ERP roles?
6 -
The challenge
With the SAST Role Conversion Service we are supporting you in all steps.✓
 What is our migration status?
1. The planned start is in the near future.
2. We have already started the project.
3. We are still undecided on how to approach the project.
 What is the migration approach?
1. Greenfield
2. Brownfield
3. "Selective Data" approach
 How should we deal with Fiori?
1. Fiori first
2. Fiori last
3. Still undecided
Which questions need to be answered before the project starts?
7 -
What changes occur with S/4HANA:
8 -
Old World
ERP
Transaction
New World
S/4HANA
Transaction
S/4HANA transaction
Multiple S/4HANA
transactions
Fiori app
Obsolete transaction
No corresponding
transactions
Use of various information sources from the SAP S/4HANA system.
More than just the concentration on the SAP Simplification List.
Improved analysis results and default values of the roles to be migrated.
Conversion of the SAP ERP role:
The one "fountainhead of truth" does not exist
9 -
Advantages of the SAST Role Conversion Service
Simplification List
SAP S/4HANA
SAP Fiori apps
reference library
SAP S/4HANA system Further tables with specific S/4HANA contents
1. Analysis of the ERP roles
 Identification of obsolete transactions.
 Identification of exchanged S/4HANA transactions.
 Identification of "fiori-only" transactions.
2. Conversion of the ERP roles
 Updating the roles based on the analysis results.
 Updating of the authorization objects on SU24 basis.
3. Inserting Fiori apps
Your steps to successfully migrate your SAP roles:
Embedded
Deployment
 Insert appropriate SAP standard catalogs
and groups to match the role.
 Inserting Fiori permissions.
Central Hub
Deployment
 Creation of Fiori frontend roles with
SAP standard catalogs and groups
matching the corresponding backend roles.
10 -
Role migration with the SAST Role Conversion Service:
- 11 -
ERP Roles
Test Points
ConversionAnalysis S/4HANA Roles
Role conversion according to the current matrix.✓
SAST SUITE
Improve the quality of your SAP roles – simply and effectively.
- 12 -
Benefit of the extended project:
Unnecessary risks are identified and directly removed!
✓
ERP Roles S/4HANA Roles
SoD Analysis
Comparison of
CCMS Statistics
Streamlining
of Roles
Option for extending the project
SAST Role Conversion Service
Take Home Messages
Highest security. We use highly specialized consultants and SAP-certified tools.
Strengthening your resources. Our experts relieve your team in the shortest
possible time.
Best practice. You benefit from our vast experience from S/4HANA migrations.
✓
✓
✓
Saving your project budget. It will be more expensive to clean up legacy problems
only after migration - not to mention damage caused by transferred security gaps.
Saving time. You shorten the migration period by considering the safety &
compliance of your S/4HANA roles right from the start of the project.
✓
✓
- 13 -
DO YOU HAVE ANY QUESTIONS?
WE ANSWER. FOR SURE.
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.
AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Tel: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: sast-solutions.com

More Related Content

What's hot

How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshoplarrymcc
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 Englishguest5bd7a1
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]akquinet enterprise solutions GmbH
 
GRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_HowtoperformasystemGRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_HowtoperformasystemBarun Kumar
 
Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewSAP Technology
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessERPScan
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP Technology
 
Unified Connectivity (UCON) for SAP NetWeaver Overview
Unified Connectivity (UCON) for SAP NetWeaver OverviewUnified Connectivity (UCON) for SAP NetWeaver Overview
Unified Connectivity (UCON) for SAP NetWeaver OverviewSAP Technology
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksErtunga Arsal
 

What's hot (20)

How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Sap abap pdf
Sap abap pdfSap abap pdf
Sap abap pdf
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
 
GRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_HowtoperformasystemGRCSing2015_Kumar_Howtoperformasystem
GRCSing2015_Kumar_Howtoperformasystem
 
Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver Overview
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big business
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
 
Unified Connectivity (UCON) for SAP NetWeaver Overview
Unified Connectivity (UCON) for SAP NetWeaver OverviewUnified Connectivity (UCON) for SAP NetWeaver Overview
Unified Connectivity (UCON) for SAP NetWeaver Overview
 
Sap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless AttacksSap Security Hacks and Mitigation - Timeless Attacks
Sap Security Hacks and Mitigation - Timeless Attacks
 

Similar to Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]

Accelerate_your_S4HANA_journey_with_automation_vfinal.pdf
Accelerate_your_S4HANA_journey_with_automation_vfinal.pdfAccelerate_your_S4HANA_journey_with_automation_vfinal.pdf
Accelerate_your_S4HANA_journey_with_automation_vfinal.pdfssusercfe9e01
 
Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Panaya
 
SAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitSAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitEdwin Weijers
 
Sap s4 hana (2)
Sap s4 hana (2)Sap s4 hana (2)
Sap s4 hana (2)babloo6
 
Strategies To Overcome SAP S/4HANA Data Migration Challenges
Strategies To Overcome SAP S/4HANA Data Migration ChallengesStrategies To Overcome SAP S/4HANA Data Migration Challenges
Strategies To Overcome SAP S/4HANA Data Migration ChallengesDipak Pimpale
 
SAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSingbBablu
 
Mastering_SAP_S_4HANA_1709_Strategies_fo.pdf
Mastering_SAP_S_4HANA_1709_Strategies_fo.pdfMastering_SAP_S_4HANA_1709_Strategies_fo.pdf
Mastering_SAP_S_4HANA_1709_Strategies_fo.pdfGERMANHERRERAH42
 
Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Benedict Yong (杨腾翔)
 
5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY
5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY
5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRYPoonam pandey
 
SAP Data Migration Tools.pdf
SAP Data Migration Tools.pdfSAP Data Migration Tools.pdf
SAP Data Migration Tools.pdfImrul Kabir pavel
 
SAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMY
SAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMYSAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMY
SAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMYAspire Techsoft Academy
 
SAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfSAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfKrishnaAkula4
 
02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf
02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf
02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdfdiamondfire201
 
SAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migrationSAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migrationArig
 
Why businesses must consider SAP S/4HANA Business Suite?
Why businesses must consider SAP S/4HANA Business Suite?Why businesses must consider SAP S/4HANA Business Suite?
Why businesses must consider SAP S/4HANA Business Suite?Anjali Rao
 
Innovations in Logistics with S4HANA Enterprise Management 1511
 Innovations in Logistics with S4HANA Enterprise Management 1511 Innovations in Logistics with S4HANA Enterprise Management 1511
Innovations in Logistics with S4HANA Enterprise Management 1511Danny Karsai
 
170627_s4hana_key_adoption_scenarios.pptx
170627_s4hana_key_adoption_scenarios.pptx170627_s4hana_key_adoption_scenarios.pptx
170627_s4hana_key_adoption_scenarios.pptxPavanSharma686420
 
5 SAP HANA Implementation Tips CIOs Sould Know
5 SAP HANA Implementation Tips CIOs Sould Know5 SAP HANA Implementation Tips CIOs Sould Know
5 SAP HANA Implementation Tips CIOs Sould KnowAbhishek Sood
 

Similar to Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar] (20)

Accelerate_your_S4HANA_journey_with_automation_vfinal.pdf
Accelerate_your_S4HANA_journey_with_automation_vfinal.pdfAccelerate_your_S4HANA_journey_with_automation_vfinal.pdf
Accelerate_your_S4HANA_journey_with_automation_vfinal.pdf
 
Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana
 
SAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitSAP S/4HANA Migration Cockpit
SAP S/4HANA Migration Cockpit
 
Sap s4 hana (2)
Sap s4 hana (2)Sap s4 hana (2)
Sap s4 hana (2)
 
Strategies To Overcome SAP S/4HANA Data Migration Challenges
Strategies To Overcome SAP S/4HANA Data Migration ChallengesStrategies To Overcome SAP S/4HANA Data Migration Challenges
Strategies To Overcome SAP S/4HANA Data Migration Challenges
 
S4 1610 business value l1
S4 1610 business value l1S4 1610 business value l1
S4 1610 business value l1
 
SAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptx
 
Mastering_SAP_S_4HANA_1709_Strategies_fo.pdf
Mastering_SAP_S_4HANA_1709_Strategies_fo.pdfMastering_SAP_S_4HANA_1709_Strategies_fo.pdf
Mastering_SAP_S_4HANA_1709_Strategies_fo.pdf
 
Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015
 
5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY
5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY
5 SAP DATA MIGRATION CHALLENGES FOR INDUSTRY
 
SAP Data Migration Tools.pdf
SAP Data Migration Tools.pdfSAP Data Migration Tools.pdf
SAP Data Migration Tools.pdf
 
SAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMY
SAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMYSAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMY
SAP S4 HANA IMPLEMENTATION GUIDE - ASPIRE TECHSOFT ACADEMY
 
SAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfSAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdf
 
02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf
02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf
02_SAP_S4HANA_Value_Roadmap_Next_Generation_Suite2.pdf
 
SAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migrationSAP ERP IMPLEMENTATION AND Sap migration
SAP ERP IMPLEMENTATION AND Sap migration
 
Why businesses must consider SAP S/4HANA Business Suite?
Why businesses must consider SAP S/4HANA Business Suite?Why businesses must consider SAP S/4HANA Business Suite?
Why businesses must consider SAP S/4HANA Business Suite?
 
Innovations in Logistics with S4HANA Enterprise Management 1511
 Innovations in Logistics with S4HANA Enterprise Management 1511 Innovations in Logistics with S4HANA Enterprise Management 1511
Innovations in Logistics with S4HANA Enterprise Management 1511
 
170627_s4hana_key_adoption_scenarios.pptx
170627_s4hana_key_adoption_scenarios.pptx170627_s4hana_key_adoption_scenarios.pptx
170627_s4hana_key_adoption_scenarios.pptx
 
5 SAP HANA Implementation Tips CIOs Sould Know
5 SAP HANA Implementation Tips CIOs Sould Know5 SAP HANA Implementation Tips CIOs Sould Know
5 SAP HANA Implementation Tips CIOs Sould Know
 
OUTSOURCING SAP
OUTSOURCING SAPOUTSOURCING SAP
OUTSOURCING SAP
 

More from akquinet enterprise solutions GmbH

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...akquinet enterprise solutions GmbH
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...akquinet enterprise solutions GmbH
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]akquinet enterprise solutions GmbH
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 

More from akquinet enterprise solutions GmbH (15)

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]
 
SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]

  • 1. How to convert your ERP roles to SAP S/4HANA! SAST Role Conversion Service
  • 2. WELCOME! Introducing your host today: - 2 - PAUL MICHAELIS SAP S/4HANA Consultant Tel: +49 40 88173-2760 Email: Paul.Michaelis@akquinet.de Web: sast-solutions.com AXEL DALDORF Senior PreSales Consultant SAST SUITE Fon: +49 40 88173-4438 Email: axel.daldorf@akquinet.de Web: www.sast-solutions.com
  • 3.  There are many different sources of information.  The creation of conversion data records is complex (with extensive SAP Simplification List).  There is inconsistency between the different S/4HANA releases.  A significant proportion of the preparatory work and analyses is done manually.  Uncertainty when using old ERP roles in a S/4HANA system:  Which transactions are obsolete or need to be replaced?  How do you recognize suitable Fiori Apps for the roles?  How do you comply with the authorization concept? How do you convert of SAP ERP roles? 6 - The challenge With the SAST Role Conversion Service we are supporting you in all steps.✓
  • 4.  What is our migration status? 1. The planned start is in the near future. 2. We have already started the project. 3. We are still undecided on how to approach the project.  What is the migration approach? 1. Greenfield 2. Brownfield 3. "Selective Data" approach  How should we deal with Fiori? 1. Fiori first 2. Fiori last 3. Still undecided Which questions need to be answered before the project starts? 7 -
  • 5. What changes occur with S/4HANA: 8 - Old World ERP Transaction New World S/4HANA Transaction S/4HANA transaction Multiple S/4HANA transactions Fiori app Obsolete transaction No corresponding transactions
  • 6. Use of various information sources from the SAP S/4HANA system. More than just the concentration on the SAP Simplification List. Improved analysis results and default values of the roles to be migrated. Conversion of the SAP ERP role: The one "fountainhead of truth" does not exist 9 - Advantages of the SAST Role Conversion Service Simplification List SAP S/4HANA SAP Fiori apps reference library SAP S/4HANA system Further tables with specific S/4HANA contents
  • 7. 1. Analysis of the ERP roles  Identification of obsolete transactions.  Identification of exchanged S/4HANA transactions.  Identification of "fiori-only" transactions. 2. Conversion of the ERP roles  Updating the roles based on the analysis results.  Updating of the authorization objects on SU24 basis. 3. Inserting Fiori apps Your steps to successfully migrate your SAP roles: Embedded Deployment  Insert appropriate SAP standard catalogs and groups to match the role.  Inserting Fiori permissions. Central Hub Deployment  Creation of Fiori frontend roles with SAP standard catalogs and groups matching the corresponding backend roles. 10 -
  • 8. Role migration with the SAST Role Conversion Service: - 11 - ERP Roles Test Points ConversionAnalysis S/4HANA Roles Role conversion according to the current matrix.✓ SAST SUITE
  • 9. Improve the quality of your SAP roles – simply and effectively. - 12 - Benefit of the extended project: Unnecessary risks are identified and directly removed! ✓ ERP Roles S/4HANA Roles SoD Analysis Comparison of CCMS Statistics Streamlining of Roles Option for extending the project
  • 10. SAST Role Conversion Service Take Home Messages Highest security. We use highly specialized consultants and SAP-certified tools. Strengthening your resources. Our experts relieve your team in the shortest possible time. Best practice. You benefit from our vast experience from S/4HANA migrations. ✓ ✓ ✓ Saving your project budget. It will be more expensive to clean up legacy problems only after migration - not to mention damage caused by transferred security gaps. Saving time. You shorten the migration period by considering the safety & compliance of your S/4HANA roles right from the start of the project. ✓ ✓ - 13 -
  • 11. DO YOU HAVE ANY QUESTIONS? WE ANSWER. FOR SURE. © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information. AXEL DALDORF Senior PreSales Consultant SAST SUITE Tel: +49 40 88173-4438 Email: axel.daldorf@akquinet.de Web: sast-solutions.com