Sap Security1
Transcript of Sap Security1
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 1/17
Excelcom
SAP Sec
Jakarta,
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 2/17
• Understand SAP Security Concept.
• Use Profile Generator.
• Maintain user account.
• Maintain user profile.
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 3/17
Chapter 1 SAP Security/Authorization Concep
Chapter 2 Profile Generator.
Chapter 3 SAP user Maintenance.
Chapter 4 System Parameter relat
Conclusion
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 4/17
• SAP Security Concept
• Authorization Concept
Contents:
• Understand the concept of authorizat
• Understand the concept of authorizat
• Understand Activity Groups.
Objectives:
I. SAP Security/Authoriza
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 5/17
SAP Secu
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 6/17
Authorizati
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 7/17
( )
* +,- .. /*+,
/
Authorization
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 8/17
contains a group of authorizations, that is, a group of access privileges
An Authorization Profile
are assigned to users in the user master records. A profile could repreposition since it defines the tasks for which a user has access privil
Profiles
form a set of tasks or activities that can be performed in the system, sprograms, transactions and other functions that generally represen
Activity Groups
identifies an element or object within the SAP system which needs to bauthorization can contain a maximum of 10 authorization fields.
An Authorization Object
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 9/17
• Working With Profile
Generator• Creating Activity Groups
Contents:
• Understand how to use Profile Gene
• Understand how to make Activity G
Objectives:
II. Profile
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 10/17
Profile Generator
A SAP Tools Available since 3.0F that aids ins facilitating the manageauthorizations and profiles. Tools Administration User MainteGroups or alternatively PFCG in the command field.
The basic steps are:
• Create the activity group.
• Select the transactions from the menu.
• Complete the authorizations for chosen activities.
• Generate the profiles.
• Assign the profiles to users.
Menu:
Creating Ac
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 11/17
• Create/Delete Users
• Create/Change User Profiles
• Tracing Authorization
Contents:
• Understand how to maintain user acc
• Understand how to trace authorizatio
Objectives:
III. SAP Users/Profiles M
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 12/17
Tools Administration Maintain User Users or
SU01 in the command field.
Menu:
Create/De
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 13/17
Tools Administration Maintain User Profile o
alternatively SU02 in the command field.
Menu:
Create/Change Us
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 14/17
Using System Trace (ST01), more general purpose to
Using transaction SU53, more specific for authorizati
Two methods are available:
Tracing Au
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 15/17
• Technical Parameters Setting related to
security.
Content:
• Understand how to set up securitysetting.
Objectives:
IV. System Parameter relate
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 16/17
minimum length of a password.
number of days after which a password must be changed.
to activate automatic log off.
specifies the number of times that a user can enter an inc
password before the system ends the logon attempt.
specifies the number of times that a user can enter an inco
password before the system locks the user against furtheattempts.
Technical
8/3/2019 Sap Security1
http://slidepdf.com/reader/full/sap-security1 17/17