Schnittstellenprogrammierung in SAP ABAP - cover

Schnittstellenprogrammierung in SAP ABAP

Tracy Juran

  • 04 november 2016
  • 9783960122432
Wil ik lezen
  • Wil ik lezen
  • Aan het lezen
  • Gelezen
  • Verwijderen

Samenvatting:

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create users and assign roles. Get tips on leveraging the profile generator transaction PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed.

- Basic architecture of SAP Security and Authorizations
- Learn how to create users and assign roles
- Introduction to GRC Access Control
- Troubleshoot common security and authorization pain points

We gebruiken cookies om er zeker van te zijn dat je onze website zo goed mogelijk beleeft. Als je deze website blijft gebruiken gaan we ervan uit dat je dat goed vindt. Ok