05 2024 档案

摘要:Copy Check indicators SU25 USOBT and USOBX tables The SU25 transaction is needed during the initial installation of SAP and during each subsequent upg 阅读全文
posted @ 2024-05-23 13:48 晨风_Eric 阅读(3) 评论(0) 推荐(0)
摘要:SU24 - Maintain Check Indicators The SU24 transaction is one of the most important transactions in security. It's used to maintain all the objects tha 阅读全文
posted @ 2024-05-23 13:46 晨风_Eric 阅读(2) 评论(0) 推荐(0)
摘要:ST01 System Traces TCODE: ST01 TCODE:SU50 阅读全文
posted @ 2024-05-23 13:45 晨风_Eric 阅读(3) 评论(0) 推荐(0)
摘要:Display Auth Data in SU53 TCODE: SU53 TCODE: SU01 阅读全文
posted @ 2024-05-23 13:44 晨风_Eric 阅读(3) 评论(0) 推荐(0)
摘要:SAP User Information System TCODE: SUIM 阅读全文
posted @ 2024-05-18 22:06 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:SAP Profile Reconciliation TCODE: PFUD TCODE: SE38 阅读全文
posted @ 2024-05-18 22:05 晨风_Eric 阅读(4) 评论(0) 推荐(0)
摘要:SAP Delivered Checks TCODE: SU22 TCODE:SE16 - USOBT vs USOBX 阅读全文
posted @ 2024-05-18 22:05 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:Default Users in SAP Default Passwords in SAP Whenever a new SAP system is built, upgraded, copied, or restored from backup, one of the very first tas 阅读全文
posted @ 2024-05-18 22:04 晨风_Eric 阅读(2) 评论(0) 推荐(0)
摘要:Custom Auth Objects in SAP Often a security administrator comes across requirements where the exiting authorization objects delivered by SAP is not en 阅读全文
posted @ 2024-05-18 22:03 晨风_Eric 阅读(4) 评论(0) 推荐(0)
摘要:Critical Basis Authorizations SAP delivers ECC 6.0 with more than 3000 authorization objects. Below are the critical ones :- Tables - Security for tab 阅读全文
posted @ 2024-05-16 18:46 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:Most Common Security Tables Below are the most common Security tables beginning with USR, AGR or UST :- USR02 - Users with logon data USR04 - Users by 阅读全文
posted @ 2024-05-16 18:45 晨风_Eric 阅读(4) 评论(0) 推荐(0)
摘要:Authorization Groups in SAP The access protection system must ensure that only authorized individuals have access to the system and to particular data 阅读全文
posted @ 2024-05-16 18:45 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:Organizational Levels in SAP Security "Organizational Levels" (Org Levels) "Organizational Levels" (Org Levels) as opposed to authorization fields is 阅读全文
posted @ 2024-05-16 18:43 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:Composite Roles in SAP Composite Roles A composite role is a container with several different roles. For reasons of clarity, it does not make sense an 阅读全文
posted @ 2024-05-16 18:42 晨风_Eric 阅读(4) 评论(0) 推荐(0)
摘要:Parent and Derived Roles in SAP Type of Roles in SAP Roles in SAP Role: Role is the group of Profiles, menus, transactions, reports and user assignmen 阅读全文
posted @ 2024-05-14 14:42 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:Roles and Authorizations in SAP T-Code: PFCG Description Menu Application Authorization User Personnalization 阅读全文
posted @ 2024-05-14 14:41 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:Login Parameters Profiles in SAP Parameters Explanation login/min_password_lng Defines the minimum length of the password. Default value:3; permissibl 阅读全文
posted @ 2024-05-14 14:40 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要:User Creation and Maintenance in SAP T-Code: SU01 Documentation Address Logon Data SNC Defaults Parameters Roles Profiles Groups User group examples: 阅读全文
posted @ 2024-05-09 11:12 晨风_Eric 阅读(3) 评论(0) 推荐(0)
摘要:User Types in SAP 1.Dialog 2.System 3.Communication 4.Service 5.Reference Dialog User User type for exactly one interactive user (all logon types incl 阅读全文
posted @ 2024-05-09 09:32 晨风_Eric 阅读(6) 评论(0) 推荐(0)
摘要:Authorization Concept in SAP Authorization Concept The R/3 authorization concept allows you to protect transactions and programs from unauthorized use 阅读全文
posted @ 2024-05-07 13:48 晨风_Eric 阅读(3) 评论(0) 推荐(0)
摘要:Authorization Checks in SAP Authorization Checks in SAP When a user starts a transaction, the system performs the following checks: The system checks 阅读全文
posted @ 2024-05-07 12:17 晨风_Eric 阅读(4) 评论(0) 推荐(0)