SlideShare a Scribd company logo
1 of 15
Trouble-free
Authorization
Redesign with
SAST Safe Go-Live
Webinar: May, 2018
Our goal to optimize authorization projects
1) Schnellere Projektlaufzeiten um bis zu 70%.
2) Geringere Projektkosten.
3) Keine Einschränkungen im Tagesgeschäft.
4) Nachhaltiger Rollenbau und passende Berechtigungswerte
innerhalb der Rolle.
5) Passgenaue Projekte, zugeschnitten auf Ihre individuellen
Anforderungen.
6) Sicheres und langfristig erfolgreiches Projektvorgehen
mit Unterstützung der AKQUINET SAST-Suite.
1) Reduce project duration
2) Reduce further project costs
3) Trouble-free authorization Golive/
No limits for business departments
4) Precisely tailored roles
5) Precisely tailored projects which fits your requirements





- 2 -
Useful functions to optimize future roles
Trouble-free Go-Live with
SAST Safe Go-Live Management
Our project approach „PLATIN“
Conception Implementation Pilot User Test Go-Live
Define Auth Concept
Define responsibles
Define work places
and required
authorizations
Risik analysis
Determine roles wich fits
business requirements
(Template-approach)
Creation of composite
roles for each business
role
Generate roles
Activate SAST Fallback
User mechanism
Exchange roles of pilot
users (in production syst.)
Correction of auth
defects
Risik analysis
Exchange roles of
remaining users
Correction of auth defects
Risk analysis
Finalization of
documentation
Analyze
Analyze transactions,
Org-elements and
documents
Analyze transaction-
usage
Analyze documents
- 3 -
Overview of all functions in SAST module SGM
- 4 -
Overview
 Complete authorization trace as basis to design future user permissions
 Automatic creation of T-Codes for table and ABAP report access
 Optimization of authorization proposals (SU24)
 Selection of permissions based on SoD free role templates
 Automatic role creation based on authorization trace for technical users
 Automatic creation of test users
 Trouble-free authorization Go-Live by usage of fallback users.
Complete authorization trace
- 5 -
Authorization trace
database
 Complete authorization trace and transaction usage as basis to design future user
permissions
 Automatic role creation based on authorization trace
for technical users
 Optimization of authorization proposals (SU24)
 Smart analysis and correction of authorization defects by using
drill down function to authorization trace database
Automatic creation of transactions
Table access (via SE16 or SM30)
Report access (via SA38/SE38)
Developer not required to create transaction codes
Opportunity to reduce assignment of critical transactions SE16/SE16N/SA38/SE38 and SM30
Automatic update of SU24-Values with objects S_PROGRAM, S_TABU_NAM and S_TABU_DIS
- 6 -
Update of:
 Parameter transactions
 Tcodes and RFC function modules
Supported by:
 Source Code analysis
 Trace analysis
Optimization of SU24 values
Save time for your authorization admins
Substained role creation  Increase of role quality
Maximum acceptance on end user side
- 7 -
 Role creation for users or user groups
 Role creation for work places
 Usage of trace information ST01 or SU53 trace buffer
Automatic role creation based on trace database
Precicely tailored roles
Low rate of authorization defects
Save time for role creation process
- 8 -
 Automatic creation of test users and role assignment
 Flexible naming of test userIDs
 Automatic definition of password
Optional
 Assignment of general basis role
 Assignment of general department role
Automatic test user creation
Save time and costs in test phase
- 9 -
 Protected GoLive with fallback function
 In case of authorization problems,
access to old permissions by user self service
function.
 Overview of fallback sessions
 Drill down function to user trace
data in order to analyze and solve
issues quickly.
Authorization GoLive supported by „SAST Safe Go-Live Management“
Separate authorization test not required anymore, hereby high time and cost savings
No restrictions for daily business after authorization GoLive
No additional SAP licence costs for due to fallback user function
- 10 -
SAST Safe Go-Live Management
Change your permissions with „Fallback“ option
- 11 -
The operative business is affected by the "fallback” option at no time!
Users with
new permissions
Go-Live
Lack of
authorization
Temporary
authorization
Productive operation
ensured
Permission adjustment
in the background
Users with
new permissions
SAST Safe Go-Live
Productive
operations
Workflow to establish fallback user session
- 12 -
Authorization problem occurs
Activate
SAST fallback function
(User Self Service)
E-Mail notification
to administrator
(automatic)
Analyze and solve issueDeactivate
SAST fallback function
Assign fallback user
E-Mail notification
to enduser
(manually)
!
 Automatic E-Mail notification in case of fallback user session
 Solution finding process significantly simplified by linking to user auth. trace data
 Average time to solve authorization issue about 5 minutes (Experience of first projects).
 Communication with end users only required in ecxeptional cases.
How to analyze authorization issues easily and quickly
- 13 -
Our project approaches
PLATIN
GOLD
SILVER
Faster project run times
Lower project costs
Precisely tailored projects
Efficient and protected projects
- 14 -
LET´S TAKE THE NEXT STEP TOGETHER
TIM KRÄNZKE
Director International Sales & Alliances
 More than 30 years experience in IT
 Specialized in SAP Security Products since 14+ years
 Long-term working with International Customers and Partners
Email: sast@akquinet.de
Web: www.sast-suite.com
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.

More Related Content

What's hot

What's hot (12)

1r BAT El Moviment Obrer (1789-1914)
1r BAT El Moviment Obrer (1789-1914)1r BAT El Moviment Obrer (1789-1914)
1r BAT El Moviment Obrer (1789-1914)
 
Teories contractualistes
Teories contractualistesTeories contractualistes
Teories contractualistes
 
Pintura Cinquecento
Pintura Cinquecento Pintura Cinquecento
Pintura Cinquecento
 
32 d casa kaufman
32 d  casa kaufman32 d  casa kaufman
32 d casa kaufman
 
LA CRISI DE LA RESTAURACIÓ-antic
LA CRISI DE LA RESTAURACIÓ-anticLA CRISI DE LA RESTAURACIÓ-antic
LA CRISI DE LA RESTAURACIÓ-antic
 
Feixisme
FeixismeFeixisme
Feixisme
 
Carpe diem
Carpe diemCarpe diem
Carpe diem
 
Unitat 9 els moviments totalitaris- 2019-20
Unitat 9   els moviments totalitaris- 2019-20Unitat 9   els moviments totalitaris- 2019-20
Unitat 9 els moviments totalitaris- 2019-20
 
La fundación.pdf
La fundación.pdfLa fundación.pdf
La fundación.pdf
 
Gustave Courbet
Gustave CourbetGustave Courbet
Gustave Courbet
 
La Segona Guerra Mundial
La Segona Guerra MundialLa Segona Guerra Mundial
La Segona Guerra Mundial
 
URINARY SYSTEM.pptx
URINARY SYSTEM.pptxURINARY SYSTEM.pptx
URINARY SYSTEM.pptx
 

Similar to SAST Safe Go-Live Management for SAP authorizations [Webinar]

Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemdharm18
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemAkshay Surve
 
[Webinar] Camunda Optimize Release 3.0
[Webinar] Camunda Optimize Release 3.0[Webinar] Camunda Optimize Release 3.0
[Webinar] Camunda Optimize Release 3.0camunda services GmbH
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...akquinet enterprise solutions GmbH
 
Service Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service WorksService Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service WorksKenneth Peeples
 
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14kbabhishek4
 
Building event-driven (Micro)Services with Apache Kafka
Building event-driven (Micro)Services with Apache Kafka Building event-driven (Micro)Services with Apache Kafka
Building event-driven (Micro)Services with Apache Kafka Guido Schmutz
 
Issue Tracking System - My B.E. Project
Issue Tracking System - My B.E. ProjectIssue Tracking System - My B.E. Project
Issue Tracking System - My B.E. ProjectDharmendra Vishwakarma
 
Continuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
Continuous Delivery of a Cloud Deployment at a Large Telecommunications ProviderContinuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
Continuous Delivery of a Cloud Deployment at a Large Telecommunications ProviderM Kevin McHugh
 
Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3Mohammad Asif
 
K N Avinash_ MBA_ BA
K N Avinash_ MBA_ BAK N Avinash_ MBA_ BA
K N Avinash_ MBA_ BAavinashmba
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...akquinet enterprise solutions GmbH
 
Seminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clSeminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clmiket60
 
Interstage BPM 2011
Interstage BPM 2011Interstage BPM 2011
Interstage BPM 2011Gordon Folz
 

Similar to SAST Safe Go-Live Management for SAP authorizations [Webinar] (20)

Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
BA Resume
BA  ResumeBA  Resume
BA Resume
 
SENTHIL RAMADOSS CV
SENTHIL RAMADOSS CVSENTHIL RAMADOSS CV
SENTHIL RAMADOSS CV
 
[Webinar] Camunda Optimize Release 3.0
[Webinar] Camunda Optimize Release 3.0[Webinar] Camunda Optimize Release 3.0
[Webinar] Camunda Optimize Release 3.0
 
SANJAY KUMAR
SANJAY KUMARSANJAY KUMAR
SANJAY KUMAR
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
Service Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service WorksService Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service Works
 
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14
 
Building event-driven (Micro)Services with Apache Kafka
Building event-driven (Micro)Services with Apache Kafka Building event-driven (Micro)Services with Apache Kafka
Building event-driven (Micro)Services with Apache Kafka
 
Issue Tracking System - My B.E. Project
Issue Tracking System - My B.E. ProjectIssue Tracking System - My B.E. Project
Issue Tracking System - My B.E. Project
 
Catherine Ner-Nacional
Catherine Ner-NacionalCatherine Ner-Nacional
Catherine Ner-Nacional
 
Job portal
Job portalJob portal
Job portal
 
Continuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
Continuous Delivery of a Cloud Deployment at a Large Telecommunications ProviderContinuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
Continuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
 
Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3
 
QSpiders - Installation and Brief Dose of Load Runner
QSpiders - Installation and Brief Dose of Load RunnerQSpiders - Installation and Brief Dose of Load Runner
QSpiders - Installation and Brief Dose of Load Runner
 
K N Avinash_ MBA_ BA
K N Avinash_ MBA_ BAK N Avinash_ MBA_ BA
K N Avinash_ MBA_ BA
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
Seminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clSeminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_cl
 
Interstage BPM 2011
Interstage BPM 2011Interstage BPM 2011
Interstage BPM 2011
 

More from akquinet enterprise solutions GmbH

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...akquinet enterprise solutions GmbH
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...akquinet enterprise solutions GmbH
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...akquinet enterprise solutions GmbH
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...akquinet enterprise solutions GmbH
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]akquinet enterprise solutions GmbH
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...akquinet enterprise solutions GmbH
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]akquinet enterprise solutions GmbH
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]akquinet enterprise solutions GmbH
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...akquinet enterprise solutions GmbH
 

More from akquinet enterprise solutions GmbH (20)

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

SAST Safe Go-Live Management for SAP authorizations [Webinar]

  • 2. Our goal to optimize authorization projects 1) Schnellere Projektlaufzeiten um bis zu 70%. 2) Geringere Projektkosten. 3) Keine Einschränkungen im Tagesgeschäft. 4) Nachhaltiger Rollenbau und passende Berechtigungswerte innerhalb der Rolle. 5) Passgenaue Projekte, zugeschnitten auf Ihre individuellen Anforderungen. 6) Sicheres und langfristig erfolgreiches Projektvorgehen mit Unterstützung der AKQUINET SAST-Suite. 1) Reduce project duration 2) Reduce further project costs 3) Trouble-free authorization Golive/ No limits for business departments 4) Precisely tailored roles 5) Precisely tailored projects which fits your requirements      - 2 -
  • 3. Useful functions to optimize future roles Trouble-free Go-Live with SAST Safe Go-Live Management Our project approach „PLATIN“ Conception Implementation Pilot User Test Go-Live Define Auth Concept Define responsibles Define work places and required authorizations Risik analysis Determine roles wich fits business requirements (Template-approach) Creation of composite roles for each business role Generate roles Activate SAST Fallback User mechanism Exchange roles of pilot users (in production syst.) Correction of auth defects Risik analysis Exchange roles of remaining users Correction of auth defects Risk analysis Finalization of documentation Analyze Analyze transactions, Org-elements and documents Analyze transaction- usage Analyze documents - 3 -
  • 4. Overview of all functions in SAST module SGM - 4 - Overview  Complete authorization trace as basis to design future user permissions  Automatic creation of T-Codes for table and ABAP report access  Optimization of authorization proposals (SU24)  Selection of permissions based on SoD free role templates  Automatic role creation based on authorization trace for technical users  Automatic creation of test users  Trouble-free authorization Go-Live by usage of fallback users.
  • 5. Complete authorization trace - 5 - Authorization trace database  Complete authorization trace and transaction usage as basis to design future user permissions  Automatic role creation based on authorization trace for technical users  Optimization of authorization proposals (SU24)  Smart analysis and correction of authorization defects by using drill down function to authorization trace database
  • 6. Automatic creation of transactions Table access (via SE16 or SM30) Report access (via SA38/SE38) Developer not required to create transaction codes Opportunity to reduce assignment of critical transactions SE16/SE16N/SA38/SE38 and SM30 Automatic update of SU24-Values with objects S_PROGRAM, S_TABU_NAM and S_TABU_DIS - 6 -
  • 7. Update of:  Parameter transactions  Tcodes and RFC function modules Supported by:  Source Code analysis  Trace analysis Optimization of SU24 values Save time for your authorization admins Substained role creation  Increase of role quality Maximum acceptance on end user side - 7 -
  • 8.  Role creation for users or user groups  Role creation for work places  Usage of trace information ST01 or SU53 trace buffer Automatic role creation based on trace database Precicely tailored roles Low rate of authorization defects Save time for role creation process - 8 -
  • 9.  Automatic creation of test users and role assignment  Flexible naming of test userIDs  Automatic definition of password Optional  Assignment of general basis role  Assignment of general department role Automatic test user creation Save time and costs in test phase - 9 -
  • 10.  Protected GoLive with fallback function  In case of authorization problems, access to old permissions by user self service function.  Overview of fallback sessions  Drill down function to user trace data in order to analyze and solve issues quickly. Authorization GoLive supported by „SAST Safe Go-Live Management“ Separate authorization test not required anymore, hereby high time and cost savings No restrictions for daily business after authorization GoLive No additional SAP licence costs for due to fallback user function - 10 -
  • 11. SAST Safe Go-Live Management Change your permissions with „Fallback“ option - 11 - The operative business is affected by the "fallback” option at no time! Users with new permissions Go-Live Lack of authorization Temporary authorization Productive operation ensured Permission adjustment in the background Users with new permissions SAST Safe Go-Live Productive operations
  • 12. Workflow to establish fallback user session - 12 - Authorization problem occurs Activate SAST fallback function (User Self Service) E-Mail notification to administrator (automatic) Analyze and solve issueDeactivate SAST fallback function Assign fallback user E-Mail notification to enduser (manually) !
  • 13.  Automatic E-Mail notification in case of fallback user session  Solution finding process significantly simplified by linking to user auth. trace data  Average time to solve authorization issue about 5 minutes (Experience of first projects).  Communication with end users only required in ecxeptional cases. How to analyze authorization issues easily and quickly - 13 -
  • 14. Our project approaches PLATIN GOLD SILVER Faster project run times Lower project costs Precisely tailored projects Efficient and protected projects - 14 -
  • 15. LET´S TAKE THE NEXT STEP TOGETHER TIM KRÄNZKE Director International Sales & Alliances  More than 30 years experience in IT  Specialized in SAP Security Products since 14+ years  Long-term working with International Customers and Partners Email: sast@akquinet.de Web: www.sast-suite.com © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.