Sap Security1

17
Excelcomindo SAP Security Jakarta, 03 September 20

Transcript of Sap Security1

Page 1: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 1/17

Excelcom

SAP Sec

Jakarta,

Page 2: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 2/17

• Understand SAP Security Concept.

• Use Profile Generator.

• Maintain user account.

• Maintain user profile.

Page 3: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 3/17

Chapter 1 SAP Security/Authorization Concep

Chapter 2 Profile Generator.

Chapter 3 SAP user Maintenance.

Chapter 4 System Parameter relat

Conclusion

Page 4: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 4/17

• SAP Security Concept

• Authorization Concept

Contents:

• Understand the concept of authorizat

• Understand the concept of authorizat

• Understand Activity Groups.

Objectives:

I. SAP Security/Authoriza

Page 5: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 5/17

SAP Secu

Page 6: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 6/17

Authorizati

Page 7: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 7/17

( )

* +,- .. /*+,

/

Authorization

Page 8: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 8/17

contains a group of authorizations, that is, a group of access privileges

An Authorization Profile 

are assigned to users in the user master records. A profile could repreposition since it defines the tasks for which a user has access privil

Profiles 

form a set of tasks or activities that can be performed in the system, sprograms, transactions and other functions that generally represen

Activity Groups 

identifies an element or object within the SAP system which needs to bauthorization can contain a maximum of 10 authorization fields.

An Authorization Object 

Page 9: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 9/17

• Working With Profile

Generator• Creating Activity Groups

Contents:

• Understand how to use Profile Gene

• Understand how to make Activity G

Objectives:

II. Profile

Page 10: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 10/17

Profile Generator 

A SAP Tools Available since 3.0F that aids ins facilitating the manageauthorizations and profiles. Tools  Administration  User MainteGroups or alternatively PFCG in the command field.

The basic steps are:

• Create the activity group.

• Select the transactions from the menu.

• Complete the authorizations for chosen activities.

• Generate the profiles.

• Assign the profiles to users.

Menu: 

Creating Ac

Page 11: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 11/17

• Create/Delete Users

• Create/Change User Profiles

• Tracing Authorization

Contents:

• Understand how to maintain user acc

• Understand how to trace authorizatio

Objectives:

III. SAP Users/Profiles M

Page 12: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 12/17

Tools  Administration  Maintain User  Users or

SU01 in the command field.

Menu: 

Create/De

Page 13: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 13/17

Tools  Administration  Maintain User  Profile o

alternatively SU02 in the command field.

Menu: 

Create/Change Us

Page 14: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 14/17

Using System Trace (ST01), more general purpose to

Using transaction SU53, more specific for authorizati

Two methods are available: 

Tracing Au

Page 15: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 15/17

• Technical Parameters Setting related to

security.

Content:

• Understand how to set up securitysetting.

Objectives:

IV. System Parameter relate

Page 16: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 16/17

minimum length of a password.

number of days after which a password must be changed.

to activate automatic log off.

specifies the number of times that a user can enter an inc

password before the system ends the logon attempt.

specifies the number of times that a user can enter an inco

password before the system locks the user against furtheattempts.

Technical

Page 17: Sap Security1

8/3/2019 Sap Security1

http://slidepdf.com/reader/full/sap-security1 17/17