SAP Authorizations Security Automation for SAP Security Checks - SAP Stuff

Direkt zum Seiteninhalt
Security Automation for SAP Security Checks
Bypass Excel-based Permissions Traps
Custom programmes should be protected with permissions, just like standard applications. What rules should you follow? Introductory projects usually produce a large number of customised programmes without being subjected to a permission check when they are executed. For your programmes, you should create custom permissions checks by default and manage them accordingly.

The difficulty in assigning permissions to the S_DATASET object is determining the correct values for the FILENAME and PROGRAMME fields. If you have not specified a path in the FILENAME field, only the files in the DIR_HOME directory will be allowed.
Grant permission for external services from SAP CRM
If a release change occurs, the adjustment of permissions is also required as a rework. You will have already learned that this task can be very complex. Many innovations make this work easier and make the whole process more transparent. In the event of a release change, not only new applications are often added, but also new or modified authorization objects, permission checks, and, as a result, modified suggestion values. With the SU25 transaction, you can update the suggestion values step by step and then update all the affected roles. So far, however, the transaction has been a kind of black box for you. You have performed each step without seeing how your suggestion values or roles have changed. We will now show you how to use the new features of the SAP NetWeaver Application Server ABAP to increase transparency in upgrading suggestion values and mixing PFCG roles.

You can use the system trace function (transaction ST01) to record the authorization checks in all modes, if the trace and the transaction to be traced run on the same application server. All object fields and their values are recorded during the authorization object check.

"Shortcut for SAP systems" is a tool that enables the assignment of authorizations even if the IdM system fails.

We advise you to define only one object with all relevant fields, as this will facilitate the maintenance of permissions.

You can also find some useful tips from practice on the subject of SAP authorizations on the page www.sap-corner.de.

Only then will the further tests be carried out.
SAP Stuff
Zurück zum Seiteninhalt