摘要: Critical Basis Authorizations SAP delivers ECC 6.0 with more than 3000 authorization objects. Below are the critical ones :- Tables - Security for tab 阅读全文
posted @ 2024-05-16 18:46 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要: Most Common Security Tables Below are the most common Security tables beginning with USR, AGR or UST :- USR02 - Users with logon data USR04 - Users by 阅读全文
posted @ 2024-05-16 18:45 晨风_Eric 阅读(4) 评论(0) 推荐(0)
摘要: Authorization Groups in SAP The access protection system must ensure that only authorized individuals have access to the system and to particular data 阅读全文
posted @ 2024-05-16 18:45 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要: Organizational Levels in SAP Security "Organizational Levels" (Org Levels) "Organizational Levels" (Org Levels) as opposed to authorization fields is 阅读全文
posted @ 2024-05-16 18:43 晨风_Eric 阅读(5) 评论(0) 推荐(0)
摘要: Composite Roles in SAP Composite Roles A composite role is a container with several different roles. For reasons of clarity, it does not make sense an 阅读全文
posted @ 2024-05-16 18:42 晨风_Eric 阅读(4) 评论(0) 推荐(0)