1 / 10

sap security online training in uk

www.magnifictraining.com - " SAP SECURITY ONLINE TRAINING " contact us:info@magnifictraining.com or 1-6786933994, 1-6786933475, 919052666559, 919052666558 By Real Time Experts from Hyderabad, Bangalore,India,USA,Canada,UK, Australia,South Africa,Malaysia.

sapehsit
Download Presentation

sap security online training in uk

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sap security online training India Online | classroom| Corporate Training | certifications | placements| support • CONTACT US: • MAGNIFIC TRAINING • INDIA +91-9052666559,9052666558 • USA : +1-678-693-3475 info@magnifictraining.com www. magnifictraining.com

  2. Sap security online training UK Agenda • What is Security • Building blocks • Common terminologies used • Most Common tools in Security • CUA www. magnifictraining.com

  3. Sap security online training USA What is Security? Security concept is same around the globe like in your normal life, security means removing or restricting unauthorized access to your belongings. For example your Car, laptop or cared cards etc IT Security? Information security (sometimes shortened to InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...) SAP Security? In the same context of InfoSec. SAP security have the same meaning… or in other words - who can do what in SAP? www. magnifictraining.com

  4. Sap security online training Canada Building Blocks • User Master • Record Roles • Profiles • Authorization Objects www. magnifictraining.com

  5. Sap security online training Australia User Master Record? A User initially has no access in SAP • When we create access in system it defines UMR User Master Record information includes: • Name, Password, Address, User type, Company information • User Group • Roles and Profiles • Validity dates (from/to) • User defaults (logon language, default printer, date format, etc) User Types: Dialog – typical for most users System – cannot be used for dialog login, can communicate between systems and start background jobs Communications Data – cannot be used for dialog login Internet services. www. magnifictraining.com

  6. Sap security online training New Zealand Roles and Profiles Roles is group of tcode (s), which is used to perform a specific business task. Each role requires specific privileges to perform a function in SAP that is called AUTHORIZATIONS There are 3 types of Roles: • Single – an independent Role • Derived – has a parent and differs only in Organization Levels. Maintain Transactions, Menu, Authorizations only at the parent level • Composite – container that contains one or more Single or Derived Roles www. magnifictraining.com

  7. Sap security online training South Africa Authorization Objects • Authorization Objects are the keys to SAP security • When you attempt actions in SAP the system checks to see whether you have the appropriate Authorizations • The same Authorization Objects can be used by different Transactions www. magnifictraining.com

  8. Sap security online training Malaysia User Buffer? • When a User logs into the system, all of the Authorizations that the User has are loaded into a special place in memory called the User Buffer • As the User attempts to perform activities, the system checks whether the user has the appropriate Authorization Objects in the User Buffer. • You can see the buffer in Transaction ??? www. magnifictraining.com

  9. Sap security online training Dubai Executing a Transaction (Authorization Checks) • Does the Transaction exist? All Transactions have an entry in table TSTC • Is the Transaction locked? Transactions are locked using Transaction SM01 Once locked, they cannot be used in any client • Can the User start the Transaction? Every Transaction requires that the user have the Object S_TCODE=Transaction Name Some Transactions also require another Authorization Object to start (varies depending on the Transaction) • What can the User do in the Transaction? The system will check to see if the user has additional Authorization Objects as necessary www. magnifictraining.com

  10. Sap security online training Pune How to trace missing Authorization Frequently you find that the role you built has inadequate accesses and will fail during testing or during production usage. Why? Why It happens? Negligence of tester or some other reason How process initiated? This process kicks when security guy receives: • Email or, •phone call or • ticket www. magnifictraining.com

More Related