Title: sap security training | sap security training in usa,uk
1SAP Security Online Training
CONTACT US SPECTO TRAINING INDIA
91-9533456356 info_at_spectoittraining.com
www.spectoittraining.com http//www.saponlinetrai
ning.in/sap-security-online-training/
2SAP Security Online Training
- Introduction
- What is Security
- Building blocks
- Common terminologies used Most Common
- tools in Security
- CUA
www.spectoittraining.com
3Sap security online training
www.spectoittraining.com
4SAP Security Online Training
- What is Security?
- Security concept is same around the globe like in
your normal life, security - means removing or restricting unauthorized access
to your belongings. For - example your Car, laptop or cared cards etc
- IT Security?
- Information security (sometimes shortened to
InfoSec) is the practice - defending information from unauthorized access,
use, disclosure, disruption, - modification, perusal, inspection, recording or
destruction. It is a general term - that can be used regardless of the form the data
may take (electronic, physical, - etc...)
- SAP Security?
- In the same context of InfoSec. SAP security have
the same meaning or in other words - who can do
what in SAP?
www.spectoittraining.com
5SAP Security Online Training
- Building Blocks
- User Master
- Record Roles
- Profiles Authorization
- Objects
www.spectoittraining.com
6SAP Security Online Training
- User Master Record?
- A User initially has no access in SAP
- When we create access in system it defines UMR
User Master Record information includes - Name, Password, Address, User type, Company
information - User Group
- Roles and Profiles
- Validity dates (from/to)
- User defaults (logon language, default printer,
date format, etc) - User Types Dialog typical for most users
System cannot be used for dialog login, can
communicate between systems and start background
jobs Communications Data cannot be used for
dialog login, can communicate between systems but
cannot start background jobs Reference cannot
log in, used to assign additional Authorizations
www.spectoittraining.com
7SAP Security Online Training
- Roles and Profiles Roles is group of tcode (s),
which is used to perform a specific business
task. - Each role requires specific privileges to perform
a function in SAP that is called AUTHORIZATIONS
There are 3 types of Roles - Single an independent Role
- Derived has a parent and differs only in
Organization Levels. Maintain Transactions, Menu,
Authorizations only at the parent level - Composite container that contains one or more
Single or Derived Roles
www.spectoittraining.com
8SAP Security Online Training
- Authorization Objects
- Authorization Objects are the keys to SAP
security - When you attempt actions in SAP the system
checks to see whether you have the appropriate
Authorizations - The same Authorization Objects can be used by
different Transactions
www.spectoittraining.com
9SAP Security Online Training
- User Buffer?
- When a User logs into the system, all of the
Authorizations that the User has are loaded into
a special place in memory called the User Buffer - As the User attempts to perform activities, the
system checks whether the user has the
appropriate Authorization Objects in the User
Buffer. - You can see the buffer in Transaction .
www.spectoittraining.com
10SAP Security Online Training
- Executing a Transaction (Authorization Checks)
- Does the Transaction exist? All Transactions have
an entry in table TSTC - Is the Transaction locked? Transactions are
locked using Transaction SM01 Once locked, they
cannot be used in any client - Can the User start the Transaction? Every
Transaction requires that the user have the
Object S_TCODETransaction Name Some Transactions
also require another Authorization Object to
start (varies depending on the Transaction) - What can the User do in the Transaction? The
system will check to see if the user has
additional Authorization Objects as necessary
www.spectoittraining.com
11 CONTACT US SPECTO TRAINING INDIA
91-9533456356 info_at_spectotraining.com
www.spectoittraining.com