3. What is Security & Why?
Security audit & consideration?
Security layers
Data layer
Access security
Operational security
Audit Security & Security audit log parameters.
Application on R/3 Security.
OS level security & Change management.
Types of Security’s
Internal Security
External Security
SAP Security
SAP SECURITY ONLINETRAINING COURSE
CONTENT :
4. User administration & Types of Users.
Central user administration (CUA).
Authorizations
Authorization Objects
Authorization profiles
Programming authorizations
Authorization groups
Missing authorizations
Authorization Trace.
Roles
Composite Role
Single Role
Derived Role
Parent Role & Child Role.
5. Transaportation of Roles & Role Mitigation.
The complete User status (SUIM).
Locking transactions.
Restricting access to SAP* & DDIC.
SAP R/3
SAP History .
SAP R/3 architecture & Layers.
Client administration.
Spool administration Basics.
Background jobs.
Monitoring.
Transport management Basics.
6.
SAP Security online training inside the SAP R/3
setting a group action represents a series of
connected steps needed to perform a definite
task.The user management method deals with
aspects of modification that happens to the users
within the system. this variation may be as a
result of inactivity, deed the corporate or
obtaining extra responsibilities. The audit cluster
can examine the approval method,
documentation of the approvals and execution.
7. SAP Security online training SAP Security is that the
back bone of the access to the SAP system. thus bulk
of the SAP risk comes from the SAP Security
configurations and access settings. The SAP Security
configuration is finished in SAP Roles that ar created
by the protection directors. The SAP Roles essentially
contain what's referred to as transactions. Generally
sense the group action represents Associate in
Nursing activity performed by Associate in Nursing
individual(s) in support of their every day
responsibilities.
<a href="http://smartmindonlinetraining.com/sap-
security-online-training/">SAP Security online
training</a>