Sap Security1

Post on 07-Apr-2018

236 views 0 download

Transcript of Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 1/17

Excelcom

SAP Sec

Jakarta,

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 2/17

• Understand SAP Security Concept.

• Use Profile Generator.

• Maintain user account.

• Maintain user profile.

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 3/17

Chapter 1 SAP Security/Authorization Concep

Chapter 2 Profile Generator.

Chapter 3 SAP user Maintenance.

Chapter 4 System Parameter relat

Conclusion

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 4/17

• SAP Security Concept

• Authorization Concept

Contents:

• Understand the concept of authorizat

• Understand the concept of authorizat

• Understand Activity Groups.

Objectives:

I. SAP Security/Authoriza

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 5/17

SAP Secu

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 6/17

Authorizati

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 7/17

( )

* +,- .. /*+,

/

Authorization

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 8/17

contains a group of authorizations, that is, a group of access privileges

An Authorization Profile 

are assigned to users in the user master records. A profile could repreposition since it defines the tasks for which a user has access privil

Profiles 

form a set of tasks or activities that can be performed in the system, sprograms, transactions and other functions that generally represen

Activity Groups 

identifies an element or object within the SAP system which needs to bauthorization can contain a maximum of 10 authorization fields.

An Authorization Object 

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 9/17

• Working With Profile

Generator• Creating Activity Groups

Contents:

• Understand how to use Profile Gene

• Understand how to make Activity G

Objectives:

II. Profile

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 10/17

Profile Generator 

A SAP Tools Available since 3.0F that aids ins facilitating the manageauthorizations and profiles. Tools  Administration  User MainteGroups or alternatively PFCG in the command field.

The basic steps are:

• Create the activity group.

• Select the transactions from the menu.

• Complete the authorizations for chosen activities.

• Generate the profiles.

• Assign the profiles to users.

Menu: 

Creating Ac

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 11/17

• Create/Delete Users

• Create/Change User Profiles

• Tracing Authorization

Contents:

• Understand how to maintain user acc

• Understand how to trace authorizatio

Objectives:

III. SAP Users/Profiles M

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 12/17

Tools  Administration  Maintain User  Users or

SU01 in the command field.

Menu: 

Create/De

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 13/17

Tools  Administration  Maintain User  Profile o

alternatively SU02 in the command field.

Menu: 

Create/Change Us

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 14/17

Using System Trace (ST01), more general purpose to

Using transaction SU53, more specific for authorizati

Two methods are available: 

Tracing Au

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 15/17

• Technical Parameters Setting related to

security.

Content:

• Understand how to set up securitysetting.

Objectives:

IV. System Parameter relate

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 16/17

minimum length of a password.

number of days after which a password must be changed.

to activate automatic log off.

specifies the number of times that a user can enter an inc

password before the system ends the logon attempt.

specifies the number of times that a user can enter an inco

password before the system locks the user against furtheattempts.

Technical

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 17/17