SAP Basis Implementation of your user and security management - SAP Stuff

Direkt zum Seiteninhalt
Implementation of your user and security management
Configuration adjustments and parameter changes
After the addition of Java Stack (the applications developed in J2EE, BSP, JSP, etc), the security standard for business processes was increased. Both ABAP and Java stack can be monitored from one platform. Netweaver supports standard protocols such as HTTP, SMTP, XML, SOAP, SSO, WEBDAV, WSDL, WMLSSO, SSL, X.509 and Unicode format (text processing representation).

Within the framework of an innovation team or test laboratory to be created, it is necessary to admit ideas outside of the SAP basis or to consciously use other sources of ideas within and outside the company. These may include business units, external service providers, universities or series of lectures on specific topics.
The typical tasks of system support and administration of an SAP landscape include, among others:
In every company with an SAP system, there is someone who is responsible for the SAP Basis. This person ensures the trouble-free operation of the SAP system. He or she accompanies maintenance work and intervenes in special situations, such as poor performance. Even for companies that hand over the operation of Basis to an external service provider, there are often still tasks from the user and authorization management environment at this point.

To influence the ABAP/Dynro generation, select Additions in the entry screen of the SPAM. Function Menu Path Turn Generation on or off Settings Ignore generation errors during the commit. Ignore error in SPAM steps If an error is detected in one step, the transaction SPAM stops processing until the error is resolved. You can always check with Status to see in which step and for what reason the abortion took place. Types of errors There are the following types of error messages: Security checks of the transaction SPAM A typical example is the OBJECTS_LOCKED_? step. The SPAM transaction interrupts processing when objects are still locked in jobs to be overwritten by the queue. Error messages of the programmes tp and R3trans The cause of error can always be found in the corresponding transport log. A typical example is the TEST_IMPORT step. This checks to see if there are unconfirmed repairs to objects overwritten by the queue. The affected objects are listed in the Testimport log. Incorrect setup of the Change and Transport System Common errors are the lack of appropriate rights to the files of the Change and Transport System or the use of old programme versions of tp or R3trans. Verify that the transport tools are working correctly with Transp Tool. Check Tool. A typical example is the DISASSEMBLE step. If adm does not have write permissions for the /usr/sap/trans/data (UNIX) directory, SPAM will cancel DISASSEMBLE with CANNOT_DISASSEMBLE_R_DATA_FILE. The transaction SPAM requires that the Change and Transport System [External] is set up correctly. For more information on known problems, see Notes 97630 and 97620.

"Shortcut for SAP Systems" makes it easier and quicker to complete a number of SAP basis tasks.

In the case of SAP Permission Inheritance, the required permissions are bundled in a Upper or Master role.

The website www.sap-corner.de offers many useful information about SAP basis.

Every day you learn something new!
SAP Stuff
Zurück zum Seiteninhalt