sap security training | sap security training in usa,uk - PowerPoint PPT Presentation

About This Presentation
Title:

sap security training | sap security training in usa,uk

Description:

www.saponlinetraining.in is providing sap security online training contact us:+91-9533456356,info@spectoittraining.com, By Real Time Experts in USA, Canada, Australia,singapore,southafrica,uk,india,malaysia,dubai. sap security certification and placements full courses details please visit our website:www.saponlinetraining.in,For any further details please contact India +91-9533456356. – PowerPoint PPT presentation

Number of Views:49

less

Transcript and Presenter's Notes

Title: sap security training | sap security training in usa,uk


1
SAP Security Online Training
CONTACT US SPECTO TRAINING INDIA
91-9533456356 info_at_spectoittraining.com
www.spectoittraining.com http//www.saponlinetrai
ning.in/sap-security-online-training/
2
SAP Security Online Training
  • Introduction
  • What is Security
  • Building blocks
  • Common terminologies used Most Common
  • tools in Security
  • CUA

www.spectoittraining.com
3
Sap security online training
www.spectoittraining.com
4
SAP Security Online Training
  • What is Security?
  • Security concept is same around the globe like in
    your normal life, security
  • means removing or restricting unauthorized access
    to your belongings. For
  • example your Car, laptop or cared cards etc
  • IT Security?
  • Information security (sometimes shortened to
    InfoSec) is the practice
  • defending information from unauthorized access,
    use, disclosure, disruption,
  • modification, perusal, inspection, recording or
    destruction. It is a general term
  • that can be used regardless of the form the data
    may take (electronic, physical,
  • etc...)
  • SAP Security?
  • In the same context of InfoSec. SAP security have
    the same meaning or in other words - who can do
    what in SAP?

www.spectoittraining.com
5
SAP Security Online Training
  • Building Blocks
  • User Master
  • Record Roles
  • Profiles Authorization
  • Objects

www.spectoittraining.com
6
SAP Security Online Training
  • User Master Record?
  • A User initially has no access in SAP
  • When we create access in system it defines UMR
    User Master Record information includes
  • Name, Password, Address, User type, Company
    information
  • User Group
  • Roles and Profiles
  • Validity dates (from/to)
  • User defaults (logon language, default printer,
    date format, etc)
  • User Types Dialog typical for most users
    System cannot be used for dialog login, can
    communicate between systems and start background
    jobs Communications Data cannot be used for
    dialog login, can communicate between systems but
    cannot start background jobs Reference cannot
    log in, used to assign additional Authorizations

www.spectoittraining.com
7
SAP Security Online Training
  • Roles and Profiles Roles is group of tcode (s),
    which is used to perform a specific business
    task.
  • Each role requires specific privileges to perform
    a function in SAP that is called AUTHORIZATIONS
    There are 3 types of Roles
  • Single an independent Role
  • Derived has a parent and differs only in
    Organization Levels. Maintain Transactions, Menu,
    Authorizations only at the parent level
  • Composite container that contains one or more
    Single or Derived Roles

www.spectoittraining.com
8
SAP Security Online Training
  • Authorization Objects
  • Authorization Objects are the keys to SAP
    security
  • When you attempt actions in SAP the system
    checks to see whether you have the appropriate
    Authorizations
  • The same Authorization Objects can be used by
    different Transactions

www.spectoittraining.com
9
SAP Security Online Training
  • User Buffer?
  • When a User logs into the system, all of the
    Authorizations that the User has are loaded into
    a special place in memory called the User Buffer
  • As the User attempts to perform activities, the
    system checks whether the user has the
    appropriate Authorization Objects in the User
    Buffer.
  • You can see the buffer in Transaction .

www.spectoittraining.com
10
SAP Security Online Training
  • Executing a Transaction (Authorization Checks)
  • Does the Transaction exist? All Transactions have
    an entry in table TSTC
  • Is the Transaction locked? Transactions are
    locked using Transaction SM01 Once locked, they
    cannot be used in any client
  • Can the User start the Transaction? Every
    Transaction requires that the user have the
    Object S_TCODETransaction Name Some Transactions
    also require another Authorization Object to
    start (varies depending on the Transaction)
  • What can the User do in the Transaction? The
    system will check to see if the user has
    additional Authorization Objects as necessary

www.spectoittraining.com
11
CONTACT US SPECTO TRAINING INDIA
91-9533456356 info_at_spectotraining.com
www.spectoittraining.com
Write a Comment
User Comments (0)
About PowerShow.com