The document discusses various questions and answers related to SAP security.
1. It provides instructions on how to reset the SAP* password from the Oracle database by deleting records from the USR02 table for SAP* users in a specific client and committing the changes.
2. It defines the differences between a role and a profile, stating that a role acts as a container that collects transactions and generates the associated profile using the Profile Generator (PFCG).
3. It lists some frequently used SAP security transaction codes like SU01 for creating and changing users, PFCG for maintaining roles, and SU53 for authorization analysis.
This document provides an overview of SAP, including:
- SAP stands for Systems, Applications and Products in Data Processing and is an integrated software that tracks business processes through one application.
- SAP uses an authorization concept with three levels of security - transaction code, authorization object, and user authorization - to control user access.
- When auditing IT general controls in SAP, it is important to consider controls around access management, change management, and computer operations due to the complexity of security in SAP.
- Key risks include segregation of duties due to financial transactions throughout the business, and complex access controls.
Sap security interview question & answersNancy Nelida
We are Providing SAP Security Online Training with real time project based training and interview question & Answers by 12+ professional trainers to the people in US, UK and Worldwide.
This document provides an overview of GRC 10 (Access Control) components and installation. It discusses the backend system requirements, including required SAP add-ons. It also discusses the frontend requirements, including a web browser and plugins. The main components of Access Control are then introduced: Access Risk Analysis identifies segregation of duties risks, Access Risk Management addresses identified risks, and Emergency Access Management allows temporary access overrides. Access Risk Analysis works by running rules against user, role, and profile definitions to identify non-compliant access combinations. Identified risks can then be remediated by changing access definitions or mitigated through manual controls if unavoidable.
1. The document discusses how to secure various assets in SAP like master data, financial reports, and user authentication.
2. It describes tools like VIRSA and Approva that are used for security, as well as the use of roles to assign authorizations to users and enforce segregation of duties.
3. Processes like authentication, authorization, and defining authorization objects, classes, and profiles are explained in relation to implementing security controls in SAP.
This document provides contact information for Sap security&grc located at FLOT NO :40, ,AMEERPET MAIN ROAD,HYD. The contact numbers listed are 9949090558 and 9704709011.
This document provides standard operating procedures for security administration of SAP R/3 systems at ABC Corp Corporation. It outlines ABC Corp's SAP security strategy and defines security roles. It also describes procedures for securing different client and system types, managing user access, setting passwords, and more. The document is 59 pages long and details ABC Corp's full policies and processes for ensuring security and access control within their SAP environments.
SAP GRC online Training on Access Control , which includes all the four components Access Risk Analysis( ARA), Emergency Access Management ( EAM), Access Request Management(ARM), Business Role Management( BRM).
GRC 12 online training
SAP GRC 10 Online Training
The document discusses the objectives and process of a security role mapping workshop for an SAP system implementation called Global One. The workshop aims to familiarize management and users with security concepts, review the template security design, discuss role and user mappings, data ownership, and segregation of duties. Key steps include mapping roles to SAP positions and users, identifying data owners responsible for approving access, and ensuring segregation of duties conflicts are addressed.
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
The document discusses authorization concepts in SAP systems. It explains that authorizations for users are created using roles and profiles, which are defined by the administrator. Roles contain authorizations that allow users to access transactions, reports, and applications. There are two ways to create new roles - copying an existing role or creating a new role based on business requirements. The process of creating a new role involves assigning transactions and programs to the role menu, defining authorizations, and generating an authorization profile.
This document provides an overview of SAP security. It discusses key concepts like user master records, roles, profiles, and authorization objects which form the building blocks of SAP security. It also explains common terminologies and tools used in SAP security like user buffer, authorization errors, and security matrix. The document demonstrates how authorization checks work when executing a transaction in SAP and lists some standard SAP password controls. It introduces the Central User Administration feature and provides examples of common security tools in SAP.
This document provides information on various SAP security concepts and configuration steps, including:
1. How to create reference user types, authorization objects, organizational fields, extract user emails, check role relationships, create authorization groups, restrict table access, check authorization groups and fields.
2. The differences between R/3 and BW security models and key authorization objects for BW queries.
3. How to create custom transactions, transport requests, background jobs, work with auditors, delete old logs, lock users, and reconcile users.
4. The tables that store role assignments, transaction authorizations, ABAP reports, activity fields, and authorization fields.
The document contains questions and answers related to SAP security concepts like user administration, roles, authorization objects, and profile generation. Some key points:
- SU01 is used to create and maintain user master records. PFCG is used to maintain roles and SU10 for mass changes to users.
- USOBX_C defines which authorization checks are performed for a transaction while USOBT_C defines default values for authorizations created in PFCG.
- The authorization objects S_USER_GRP, S_USER_PRO, and S_USER_AUT are required to create and maintain user master records.
- There are different types of users like dialog, service, system and
Derived master roles Configuration screenshots in SAP Security Bharath Trainings
1. Create a master role first and then create derived roles by selecting the master role. This propagates authorizations from the master role to derived roles.
2. To delete the inheritance relationship between a master and derived role, remove the master role selection from the derived role. The derived role then becomes independent and can no longer inherit authorizations from the master role.
3. Authorizations can be pushed from a master role to all derived roles using the push button after making changes to authorizations in the master role.
Anil Kumar has over 5 years of experience in SAP Security, including roles as a Solution Delivery Lead and consultant. He has expertise in SAP ECC 6.0, S4HANA, and GRC 10.1/12. Some of his responsibilities have included designing security frameworks, implementing role-based access controls, conducting security audits, troubleshooting authorization issues, and managing user access and provisioning. He has worked on projects involving security upgrades, implementations, and internal compliance audits for clients in various industries.
This document provides an overview of auditing SAP GRC (Governance, Risk, and Compliance) at The Coca-Cola Company. It introduces Sean Campbell and Jay Gohil, who are IT auditors at Coca-Cola, and discusses SAP security, GRC modules, and key areas of focus for auditing SAP GRC including governance, configuration, change management, access risk analysis, and emergency access management. Common audit issues with SAP GRC implementations are also reviewed such as ruleset and risk changes, mitigating controls, business process changes, and firefighter access management.
The presentation describes 5 steps you should take to secure your SAP. There are:
1. Pentesting and Audit
2. Compliance
3. Internal security and SOD
4. ABAP Source code review
5. Forensics
Kellton Tech is a leading provider of SAP GRC and security solutions. SAP GRC Access Control uses four main components - Access Risk Analysis, Emergency Access Management, Business Role Management, and Access Request Management - to improve business decisions by managing risks and access controls. The document discusses these components and how they help companies like PAR Pacific and H&E Equipment Services better govern access, reduce risks, and lower compliance costs. It also highlights Kellton Tech's mobile apps and expertise in implementing SAP GRC solutions.
SAP SECURITY training by yektek has unique content.
http://www.yektek.com/sap-security-online-training
SECURITY online Training will cover R3 security online training, BI security online training, HR security online training, CRM security online training, SRM Security online training and PORTAL security online training.
The document discusses various security concepts in SAP BI 7 including differences from BW 3.x, restricting reporting user access, authorization trace, creation and assignment of analysis authorizations, securing access to workbooks, additional security features in BI 7 like analysis authorizations and new authorization objects. It provides details on securing data access at different levels like InfoCube, characteristic, and key figure and describes options for securing data access like using queries or info objects.
The document provides an overview of SAP's authorization concept, which controls access to transactions and data in SAP systems. It describes the key components of authorization objects, authorizations, profiles, roles, and users. Authorization objects define the individual fields that can be restricted for an object, like an application. Authorizations are then created by assigning values to the fields in authorization objects. Profiles collect authorizations and can be assigned to users. Roles are similar to profiles but are generated by the profile generator tool. The profile generator also creates composite roles and profiles.
The document discusses ARM workflows in SAP GRC Access Controls. It provides an overview of key concepts like MSMP, the new workflow engine, and BRF+, the business rules framework. It then details the various steps to create an ARM workflow, including defining initiator and agent rules using BRF+, configuring paths and approvers in MSMP, and activating the workflow.
The document provides an implementation methodology for SAP's GRC Access Control solution based on best practices. It involves six phases: preparation, deploying and installing the access control tool suite, risk analysis and remediation using Compliance Calibrator, super user privilege management with Firefighter, compliant user provisioning with Access Enforcer, and enterprise role management with Role Expert. The methodology aims to make access and authorization risk management an integral part of organizational activities from identifying issues to preventing future risks.
The document discusses the benefits of exercise for mental health. It states that regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against developing mental illness and improve symptoms for those who already have a condition.
Fiori for s4 hana troubleshooting tips and tricksJasbir Khanuja
The document provides tips for troubleshooting Fiori applications. It discusses learning the basics of the Fiori integration flow and ABAP programming model. Common errors with OData services, authorizations, and CDS views are explained. Steps for starting a troubleshooting session are outlined, such as clearing caches, analyzing errors, and performing corrective measures. The document also covers identifying what backend objects like Enterprise Search, CDS views, and ABAP code are being consumed by OData services.
CSI tools SAP Authorization Presentation TROOPERS 2014CSI tools
The document discusses SAP authorizations and access management. It notes that while SAP systems have over 150,000 transaction codes, access is actually managed through around 1,000 authorization objects. If a user has access to a core authorization object, they have potential access to many transactions and functions. The document advocates simplifying authorizations by grouping them based on the types of master data, like vendor, customer, or material, rather than individual transactions. This allows for more flexibility in defining access policies at the data level rather than the transaction level. It also warns that authority checks can be disabled, leaving the system vulnerable.
The document outlines best practices for authorizations in SAP. It discusses role naming conventions, using different role types correctly like single, composite and master/derived roles. It emphasizes maintaining an authorization matrix and documenting any changes. Unmaintained authorizations should be avoided. Tips provided include deactivating standard roles when changing authorizations and using the 'Read old status and merge with new data' option when updating roles.
SAP GRC online Training on Access Control , which includes all the four components Access Risk Analysis( ARA), Emergency Access Management ( EAM), Access Request Management(ARM), Business Role Management( BRM).
GRC 12 online training
SAP GRC 10 Online Training
The document discusses the objectives and process of a security role mapping workshop for an SAP system implementation called Global One. The workshop aims to familiarize management and users with security concepts, review the template security design, discuss role and user mappings, data ownership, and segregation of duties. Key steps include mapping roles to SAP positions and users, identifying data owners responsible for approving access, and ensuring segregation of duties conflicts are addressed.
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
The document discusses authorization concepts in SAP systems. It explains that authorizations for users are created using roles and profiles, which are defined by the administrator. Roles contain authorizations that allow users to access transactions, reports, and applications. There are two ways to create new roles - copying an existing role or creating a new role based on business requirements. The process of creating a new role involves assigning transactions and programs to the role menu, defining authorizations, and generating an authorization profile.
This document provides an overview of SAP security. It discusses key concepts like user master records, roles, profiles, and authorization objects which form the building blocks of SAP security. It also explains common terminologies and tools used in SAP security like user buffer, authorization errors, and security matrix. The document demonstrates how authorization checks work when executing a transaction in SAP and lists some standard SAP password controls. It introduces the Central User Administration feature and provides examples of common security tools in SAP.
This document provides information on various SAP security concepts and configuration steps, including:
1. How to create reference user types, authorization objects, organizational fields, extract user emails, check role relationships, create authorization groups, restrict table access, check authorization groups and fields.
2. The differences between R/3 and BW security models and key authorization objects for BW queries.
3. How to create custom transactions, transport requests, background jobs, work with auditors, delete old logs, lock users, and reconcile users.
4. The tables that store role assignments, transaction authorizations, ABAP reports, activity fields, and authorization fields.
The document contains questions and answers related to SAP security concepts like user administration, roles, authorization objects, and profile generation. Some key points:
- SU01 is used to create and maintain user master records. PFCG is used to maintain roles and SU10 for mass changes to users.
- USOBX_C defines which authorization checks are performed for a transaction while USOBT_C defines default values for authorizations created in PFCG.
- The authorization objects S_USER_GRP, S_USER_PRO, and S_USER_AUT are required to create and maintain user master records.
- There are different types of users like dialog, service, system and
Derived master roles Configuration screenshots in SAP Security Bharath Trainings
1. Create a master role first and then create derived roles by selecting the master role. This propagates authorizations from the master role to derived roles.
2. To delete the inheritance relationship between a master and derived role, remove the master role selection from the derived role. The derived role then becomes independent and can no longer inherit authorizations from the master role.
3. Authorizations can be pushed from a master role to all derived roles using the push button after making changes to authorizations in the master role.
Anil Kumar has over 5 years of experience in SAP Security, including roles as a Solution Delivery Lead and consultant. He has expertise in SAP ECC 6.0, S4HANA, and GRC 10.1/12. Some of his responsibilities have included designing security frameworks, implementing role-based access controls, conducting security audits, troubleshooting authorization issues, and managing user access and provisioning. He has worked on projects involving security upgrades, implementations, and internal compliance audits for clients in various industries.
This document provides an overview of auditing SAP GRC (Governance, Risk, and Compliance) at The Coca-Cola Company. It introduces Sean Campbell and Jay Gohil, who are IT auditors at Coca-Cola, and discusses SAP security, GRC modules, and key areas of focus for auditing SAP GRC including governance, configuration, change management, access risk analysis, and emergency access management. Common audit issues with SAP GRC implementations are also reviewed such as ruleset and risk changes, mitigating controls, business process changes, and firefighter access management.
The presentation describes 5 steps you should take to secure your SAP. There are:
1. Pentesting and Audit
2. Compliance
3. Internal security and SOD
4. ABAP Source code review
5. Forensics
Kellton Tech is a leading provider of SAP GRC and security solutions. SAP GRC Access Control uses four main components - Access Risk Analysis, Emergency Access Management, Business Role Management, and Access Request Management - to improve business decisions by managing risks and access controls. The document discusses these components and how they help companies like PAR Pacific and H&E Equipment Services better govern access, reduce risks, and lower compliance costs. It also highlights Kellton Tech's mobile apps and expertise in implementing SAP GRC solutions.
SAP SECURITY training by yektek has unique content.
http://www.yektek.com/sap-security-online-training
SECURITY online Training will cover R3 security online training, BI security online training, HR security online training, CRM security online training, SRM Security online training and PORTAL security online training.
The document discusses various security concepts in SAP BI 7 including differences from BW 3.x, restricting reporting user access, authorization trace, creation and assignment of analysis authorizations, securing access to workbooks, additional security features in BI 7 like analysis authorizations and new authorization objects. It provides details on securing data access at different levels like InfoCube, characteristic, and key figure and describes options for securing data access like using queries or info objects.
The document provides an overview of SAP's authorization concept, which controls access to transactions and data in SAP systems. It describes the key components of authorization objects, authorizations, profiles, roles, and users. Authorization objects define the individual fields that can be restricted for an object, like an application. Authorizations are then created by assigning values to the fields in authorization objects. Profiles collect authorizations and can be assigned to users. Roles are similar to profiles but are generated by the profile generator tool. The profile generator also creates composite roles and profiles.
The document discusses ARM workflows in SAP GRC Access Controls. It provides an overview of key concepts like MSMP, the new workflow engine, and BRF+, the business rules framework. It then details the various steps to create an ARM workflow, including defining initiator and agent rules using BRF+, configuring paths and approvers in MSMP, and activating the workflow.
The document provides an implementation methodology for SAP's GRC Access Control solution based on best practices. It involves six phases: preparation, deploying and installing the access control tool suite, risk analysis and remediation using Compliance Calibrator, super user privilege management with Firefighter, compliant user provisioning with Access Enforcer, and enterprise role management with Role Expert. The methodology aims to make access and authorization risk management an integral part of organizational activities from identifying issues to preventing future risks.
The document discusses the benefits of exercise for mental health. It states that regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against developing mental illness and improve symptoms for those who already have a condition.
Fiori for s4 hana troubleshooting tips and tricksJasbir Khanuja
The document provides tips for troubleshooting Fiori applications. It discusses learning the basics of the Fiori integration flow and ABAP programming model. Common errors with OData services, authorizations, and CDS views are explained. Steps for starting a troubleshooting session are outlined, such as clearing caches, analyzing errors, and performing corrective measures. The document also covers identifying what backend objects like Enterprise Search, CDS views, and ABAP code are being consumed by OData services.
CSI tools SAP Authorization Presentation TROOPERS 2014CSI tools
The document discusses SAP authorizations and access management. It notes that while SAP systems have over 150,000 transaction codes, access is actually managed through around 1,000 authorization objects. If a user has access to a core authorization object, they have potential access to many transactions and functions. The document advocates simplifying authorizations by grouping them based on the types of master data, like vendor, customer, or material, rather than individual transactions. This allows for more flexibility in defining access policies at the data level rather than the transaction level. It also warns that authority checks can be disabled, leaving the system vulnerable.
The document outlines best practices for authorizations in SAP. It discusses role naming conventions, using different role types correctly like single, composite and master/derived roles. It emphasizes maintaining an authorization matrix and documenting any changes. Unmaintained authorizations should be avoided. Tips provided include deactivating standard roles when changing authorizations and using the 'Read old status and merge with new data' option when updating roles.
The document discusses best practices for custom security design in SAP projects, noting that different teams are involved in various phases from requirements to testing and that security should be involved from the start. It provides tips for authorization checks in reports, transactions, and tables and recommends using standard authorization objects where possible over custom ones. The presentation also outlines three scenarios involving varying levels of security team involvement and the impacts.
Digital Library Home Access: User Validation, E- Resources Proxying and Federation. Francisco Fernandez et al. 2nd Conference National Digital Libraries of Health (Sevilla, 2008)
SAP enhancement packages provide new functionality for SAP ERP in optional, modular packages that can be installed separately from support packages. The document discusses SAP enhancement package 4, including an overview of new features across various areas such as financials, sales and service, procurement, and HCM. It also covers the architecture, implementation procedure, and customer experiences related to installing and activating SAP enhancement packages.
Digital Consent: Taking UMA from Concept to RealityForgeRock
This document discusses digital consent and the User-Managed Access (UMA) standard. It argues that current "post-compliance" consent tools like OAuth are limited and that customers need "Consent 2.0" solutions that provide context, control, choice and respect regarding personal data sharing. The UMA standard uses federated authorization on top of OAuth to enable party-to-party sharing driven by policy rather than requiring direct user involvement. The document demonstrates how UMA works in action and notes that ForgeRock will deliver two key OpenUMA components by the end of 2015 to help realize Consent 2.0.
El documento presenta el plan de estudios de 10 semestres de la carrera de Administración de Empresas. En los primeros 7 semestres los estudiantes toman asignaturas básicas de administración, economía, contabilidad, estadística, informática y matemáticas. En los semestres 8o y 9o se enfocan en especializaciones como finanzas, sistemas de información y planificación estratégica. El 10o semestre incluye prácticas profesionales y seminarios para la elaboración del trabajo de gra
Documentum is an enterprise content management system that provides a unified environment for capturing, storing, accessing, organizing, controlling, retrieving and archiving unstructured information. It stores content and associated metadata in a central repository. Content can be any file type and is managed through its lifecycle with services that support workflows, records management, delivery, and integration with external systems. Security services include authentication, authorization, auditing and information rights management.
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...NextLabs, Inc.
Part 2: SAP authorization model for Export Compliance
All global companies need to comply with one or more export compliance regulations when authorizing access to data. In Part 2, we will provide an in depth example of the authorization framework using export compliance as a showcase.
http://www.nextlabs.com/html/?q=web-request-webinar-information-risk-management
Enterprise Content Management, Documentum Overview. This presentation shows what is ECM, why we need ECM, EMC History, EMC Content Management Portfolio, Documentum and Captiva Products overview
The document provides a guide to creating and using authorization objects in SAP systems in the simplest way. It explains how to create an authorization field, authorization class and object. It then demonstrates how to create a role, profile and authorization to control user permissions. The guide codes an authorization check in ABAP and provides steps to test the authorization configuration.
The document discusses security risks in SAP systems and how cryptographic solutions can address them. It describes how technologies like secure single sign-on (SSO), encryption of data communications through Secure Network Communication (SNC), and digital signatures of documents through SAP's Secure Signature Framework (SSF) can authenticate users, encrypt data transmissions, and digitally sign files. The presentation provides examples of how these cryptographic methods have been implemented for SAP systems to facilitate secure access, communications, and document signing.
Profiling for SAP - Compliance Management, Access Control and Segregation of ...TransWare AG
Complex ERP systems are potentially susceptible to segregation of duties (SoD) issues. By means of Profiling for SAP®, the desired responsibilities of SAP® users can be counterchecked against the real usage of SAP®
How to Archive FI_ACCOUNT (Archiving Objects) in SAP R/3; using SARA T-Code and how to Read archived file with using SARI T-Code.(This Archiving Object doesn't have Read Program)
Benefits of Data Archiving in Data WarehousesVineet
This IBM whitepaper recommends data lifecycle management and archiving strategies that can help organizations address data explosion challenges in data warehouses.
This document discusses workflow templates in SAP applications. It provides an overview of available templates for different modules like asset management, finance, human resources, etc. It describes some commonly used templates and the steps to customize and enhance existing templates, including configuring organizational plans and task agents, activating event linkage, setting deadlines, and creating workflow versions. The document explains how to identify the business process, select a suitable template, and extend it if needed to meet additional requirements.
Service Center is a business process management (BPM) system with unique features designed to rapidly create paper less work environment, connect people anywhere, anytime over web, improve workflow and work management process in organizations
The document discusses requirements engineering and analysis. It defines requirements elicitation, analysis, and specification. The goal of requirements analysis is to study user needs to define software requirements. A requirements specification precisely describes required functions, performance, constraints, and quality attributes. It also discusses types of requirements, the difference between requirements and design, and quality attributes.
The document discusses methodology for rolling out a project management software called ]po[. It provides an overview of implementation steps and checkpoints during various phases. It also discusses key factors for a successful rollout like change management, user buy-in, training, and support. Multiple examples of typical rollouts are provided for different processes like accounting integration, workflow implementation, and involving other project managers.
BPM & Workflow in the New Enterprise ArchitectureNathaniel Palmer
The document discusses workflow and business process management standards. It defines key standards like BPMN, XPDL, BPEL, Wf-XML, and BPAF. These standards address different aspects of modeling, executing, and monitoring business processes. The goal of these standards is to provide interoperability and allow business-level control and agility when managing business processes across systems.
BPM & Workflow in the New Enterprise ArchitectureNathaniel Palmer
The document discusses workflow and business process management standards. It defines key standards like BPMN, XPDL, BPEL, Wf-XML, and BPAF. These standards address areas like process modeling notation, process definition formats, executable processes, runtime integration between processes, and analytics formats. The goal of these standards is to enable business-level agility by allowing businesses to change processes without programming through separation of responsibilities between business and IT.
This document discusses testing in Agile projects using SAP Activate methodology. It provides an overview of the SAP Activate phases including Explore, Realize, Deploy, and Run. It then describes various testing activities and artifacts used in Agile such as user stories, prioritization, sprint cycles, integration with HPQC, and risk-based testing. Testing is integrated throughout the SAP Activate phases with a focus on iterative development and validation.
Mitul Jain has over 3 years of experience as an SAP GRC and Security consultant. He has worked on multiple projects implementing SAP GRC Access Control 10.x and securing SAP systems. His skills include role administration, user management, access request management, risk analysis, and emergency access management. He is currently working as a senior consultant with Ernst & Young Global Shared Services.
The document provides an overview of ERP (Enterprise Resource Planning) and SAP. It defines ERP as a system that integrates business functions like finance, manufacturing, supply chain, and human resources. SAP is an ERP software package that covers all enterprise business functions in an integrated manner. The document also discusses some key SAP modules like Sales and Distribution, Materials Management, Production Planning, Project Systems, CRM and SAP HR. It provides a brief introduction to various SAP concepts like client, three-tier architecture and ASAP methodology.
The document provides details of Gourav Ladha's professional experience, qualifications, industry exposure, technical skills and sample projects. It summarizes his 10+ years of experience in SAP and IT risk consulting, including roles at EW Consultants, EXL Service.com, Ernst & Young and Sapient Consulting. His expertise includes SAP security, controls review, SOX compliance, and benchmarking engagements across multiple industries.
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
In Part 1, we will provide an overview of the existing SAP authorization mechanism – the SAP Authorization Toolbox, and introduce industry models for applying access control.
The document outlines the IT organization and controls at Christy Cirino including:
1. The service delivery management methodology focuses on program and project management, architecture, and strategy.
2. The IT service management process framework includes incident, problem, change, and configuration management processes to support service desk, IT management, and business users.
3. Detailed process flows are provided for incident management, problem management, and change and configuration management which involve identification, classification, resolution, and closure of incidents, problems, and change requests.
INTRODUCTION to software engineering requirements specificationskylan2
The document discusses software requirements and their importance. It defines requirements as specifications of what a system should implement. Requirements include functional requirements that describe system services and non-functional requirements that constrain the system or development process. User requirements are high-level descriptions written for users, while system requirements provide more detailed specifications. An effective software requirements specification establishes agreements between customers and developers, reduces defects, and provides a baseline for project planning, validation, and future enhancements.
The document summarizes a webinar about Smart ERP Solutions' configurable PeopleSoft user interface and workflow/security solutions. It describes common problems with standard PeopleSoft pages being too complex and not tailored enough. The webinar covered solutions like Smart Grants Proposal and Smart Budget Transfer that simplify and extend PeopleSoft functionality. It also demonstrated Smart Voucher featuring enhanced workflow and security, and Smart Enrollment improving the enrollment process. The webinar concluded that pre-built configurable solutions can address customization needs better than customizing PeopleSoft itself.
This document provides information about E&E Systems Co, an Iranian company that provides compliance management software solutions for ISO management system standards. It details the company's history, vision, values, products and services. The key products are Document Management Software, Corrective and Preventive Action Management Software, Supplier Evaluation Management Software, and After-Sales Service Management Software. The document also lists some featured customers across various industries that use E&E's software solutions.
This document provides an overview and instructions for configuring Oracle Fusion Receivables. It discusses key features of Oracle Fusion Financials including embedded reporting, role-based dashboards, and spreadsheet integration. Implementation options and tasks are outlined such as defining the enterprise structure, creating a chart of accounts, and setting up receivables activities, payment terms, and approval limits. Key receivables processes and roles are also summarized.
The document discusses the phases of the Software Development Life Cycle (SDLC):
1) The phases include requirement analysis, design, coding, testing, deployment, and maintenance.
2) The requirement phase involves documenting business requirements, user requirements, and functional requirements in a Software Requirement Specification.
3) The analysis phase involves identifying requirements, problems, opportunities for improvement, timelines and resources costs.
4) The design phase determines instructions to meet customer requirements and includes high and low level design specifications.
This document provides an overview of public speaking and how to deliver effective speeches. It discusses determining the purpose and knowing the audience when developing a speech. The speaker should research the topic, organize the speech into an introduction, body, and conclusion. Effective delivery involves using passion, precise language, body language, vocal variety, and visual aids. After the speech, the speaker can improve by getting feedback. The document also describes Toastmasters International, a nonprofit organization that helps members improve their public speaking and leadership skills through practice, evaluations, and an educational program.
Divide is a mobile security solution that allows users to securely access work applications and data on personal Android and iOS devices through a separate, encrypted work environment. Key features include installing the Divide app from the app store, accessing work email, contacts and calendar through a secure container, remote tracking and management of devices and data by IT, and customization options for the corporate interface. While feature support varies between platforms, Divide provides a way to separate work and personal data on mobile devices through encryption and access controls.
Designing and implementing high performance rule based applicationsGuang Ying Yuan
The document discusses best practices for optimizing performance in ILOG BRMS rule projects. It recommends limiting the size of the XOM import, BOM, and vocabulary to reduce memory usage. Dividing rule projects and enabling decision validation services early are also suggested. The document discusses optimizing ruleflows, decision tables, and build performance in Rule Studio. It also notes the different engine algorithms and recommends measuring performance during development to identify issues.
The document provides an overview of the Lombardi Teamworks product, including its architecture, deployment topology, and key components. It discusses the model-driven approach, shared process model, and integrated platform for rapid development. Key capabilities mentioned include process modeling, simulation, optimization, integration, and human workflow features.
This document provides a roadmap for IBM Professional Certification in WebSphere. It outlines certification paths for different job roles including administrators, designers, and developers at various levels. The benefits of certification are described as providing a valid way to assess skills, help IBM validate skills, and create a community of certified professionals. Details are given for an example certification such as the IBM Advanced System Administrator - WebSphere Application Server including objectives measured and recommended resources for preparation.
Agile Software Development Overview 1231560734008086 2Guang Ying Yuan
The document introduces agile software development methods. It discusses the goals of being able to speak confidently about agile and provide solutions to problems teams face. The agenda covers introductions to agile principles, roles, planning, reporting, retrospectives, and estimating. Popular agile methods like Scrum and XP are explained. The roles of product managers and product owners are compared.
The document lists chapter titles from textbooks about ABAP programming. The chapters cover defining data types, examples of ABAP programs, working with database and internal tables, designing reports, the syntax of ABAP, defining data objects, character, number, date and time types, records and tables, complex data types, system fields, dictionary tables, copying and converting fields.
This document is the table of contents for a book that provides guidance on answering common interview questions. The book is designed to help job seekers prepare responses to 64 tough questions commonly asked in interviews. It disclaims providing professional advice and notes any names used are fictional. The dedication of the book is to courage and knowledge, the qualities most needed to succeed in job searches and human challenges.
This document provides an introduction to developing applications using the Java APIs for IBM Content Manager, IBM FileNet P8 Content Manager, and IBM Information Integrator Content Edition. It outlines how to set up the IBM Rational Application Developer environment for each API and includes examples of basic tasks like logging on, searching, retrieving and viewing documents. The target skill level is intermediate developers interested in managing enterprise content.
The document discusses ways to work smarter in software development. It argues that many current practices are "unsmart" and promotes an agile, lightweight approach focused on the essentials. It emphasizes that software is developed by people and that processes should focus on what is most useful to teams rather than following templates or models rigidly. The key to becoming smarter is continuous learning from diverse sources and improving work in small, incremental steps.
The document provides an overview of SAP technology including:
- An introduction to core SAP products and their applications.
- A discussion of the SAP BASIS system including architecture, administration tools, and customizing.
- Details on SAP development environments, interfaces, internet capabilities, and support infrastructure.
SAP NetWeaver 2004s introduced many new features for BI, data integration, security, and reporting. Key features included an improved Web Application Designer, BI Accelerator for faster queries, new capabilities in the BEx Broadcaster, an updated BEx Query Designer, the new BEx Report Designer, an enhanced Remodeling Toolbox, more granular security authorizations, an updated ETL design interface, integrated planning in BPS, PDF print support, and improvements to the BEx Web Analyzer and real-time data warehousing. The document provided details on upgrading and considerations for various components in the new version.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just tools—they're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPathCommunity
Join this UiPath Community Berlin meetup to explore the Orchestrator API, Swagger interface, and the Test Manager API. Learn how to leverage these tools to streamline automation, enhance testing, and integrate more efficiently with UiPath. Perfect for developers, testers, and automation enthusiasts!
📕 Agenda
Welcome & Introductions
Orchestrator API Overview
Exploring the Swagger Interface
Test Manager API Highlights
Streamlining Automation & Testing with APIs (Demo)
Q&A and Open Discussion
Perfect for developers, testers, and automation enthusiasts!
👉 Join our UiPath Community Berlin chapter: https://community.uipath.com/berlin/
This session streamed live on April 29, 2025, 18:00 CET.
Check out all our upcoming UiPath Community sessions at https://community.uipath.com/events/.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Day5 R3 Basis Security
1. Day 5 : SAP R/3 Application Authorization Concept ERP 系統維護 Enterprise Technology - SAP
2. Course Content Unit 6 Access Control and User Administration Unit 1 Introduction Unit 2 Conception with ASAP Methodology Unit 3 Elements of the R/3 Authorization Concept Unit 4 The User Master Unit 5 Working with the Profile Generator
4. Security Requirements SAP Security Levels SAP Access Control Users, Roles and Authorizations Technical Implementation of Roles Contents: Introduction
5. Describe the SAP authorization concept as part of a comprehensive security concept Explain the access control mechanisms Explain how users, roles and authorizations are related Describe the technical implementation of a role- based authorization concept At the conclusion of this unit, you will be able to: Introduction Unit Objectives
6. Technology Hardware Router DB Backup Password Rules Authorizations ... Organi z ation Procedures Training Environment Fire Alarms Water Detection Technology Disk Crash Power Supply Interruption Threats Measures Assets Persons Incorrect Operation Hackers Environment Floods Earthquakes Security - Overview Hardware Software Data Persons
7. SAP Security Levels Security Considerations Access control, virus scanners, encryption Access control, packet filtering, encryption Layer Components GUI, Browser, PC SAProuter , Network, SNC Presentation Communication SAP users, password rules, authorizations Access to SAP tables, backup, consistency Access to SAP files, OS services Application modules, work processes, interfaces Relational database UNIX, Windows NT, OS/ 400, OS 390 Application Database Operating System Encryption, certificates, Single Sign-On ITS Web Connection
8. Data Data Functions Functions System Access Control Users must identify themselves in the system Configuration of system access control (e.g. password rules) Access Control Access rights for functions and data must be granted explicity using authorizations Authorization checks for Transaction/report calls Program execution SAP Access Control
9. Create Purchase Requisition (ME51) Order Purchase Requisition (ME58) Release Purchase Requisition (ME54) Employees have roles with specific functions and need authorizations for these functions Employees Employees have roles roles with specific functions functions and need authorizations authorizations for these functions Users, Roles, and Authorizations Karen Karen Susan Susan John John Procurement Employee Service Representative Employee Service Representative Manager Employee Purchaser Authorization to create purchase requisitions Authorization to release purchase requisitions Authorization to create purchase orders
10. Role Professional Purchaser Role Professional Purchaser Technical Implementation of Roles Role Menu Accessible Transctions , Reports, Web Links Structure of the Menus/Access Paths Authorizations Selective Access to Business Functions and Data User
11. SAP Easy Access - User-Specific Menus M enu E dit F avorites E x tras S y stem H elp Other menu Create menu Assign users Role BC_USER_ADMIN Favorites SM51 List of SAP Systems User Administration SU01 - User Maintenance PFCG - Role Maintenance SU01D - Display User SU05 - Internet User Maintenance SU10 - User Mass Maintenance SUGR - Maintain User Groups
12. Describe the SAP authorization concept as part of a comprehensive security concept Explain the access control mechanisms Explain how users, roles and authorizations are related Describe the technical implementation of a role- based authorization concept You are now able to: Introduction: Unit Summary
14. ASAP methodology for creating an authorization concept Project preparation Analysis and design of the authorization concept Implementation of the authorization concept Testing and quality assurance Cutover Contents: Conception with ASAP Methodology
15. List the steps necessary to implement an authorization concept Describe the activities to be performed in each step Assign responsible persons to each activity Use the ASAP procedure model for implementing an authorization concept for your own projects At the conclusion of this unit, you will be able to: Conception with ASAP Methodology: Unit Objectives
16. Before going live, your company wants to implement an authorization concept. The steps required to realize the authorization concept must be planned in the context of the entire implementation process. During the planning phase you want to estimate the time and personnel resources needed. Conception with ASAP Methodology: Business Scenario
17. Role and Authorization Concept: Steps Preparation Preparation Analysis Analysis & & Conception Conception A Role and Authorization Concept is Implemented in 5 Steps Each Step Comprises Different Activities Each Activity is Associated with a Responsible Person User Administration and Authorization Management Organization is Parallel to User and Authorization Concept Implementation Implement- Implement- ation ation Quality Quality Assurance Assurance & Tests & Tests Cutover Cutover Determine User and Determine User and Authorization Administration Strategy Authorization Administration Strategy
18. Measures: Set Up a Team for User Roles and Authorizations Clarify Prerequisites for Authorization Assignment Train the Team for User Roles and Authorizations Trigger Role and Authorization Project Step 1: Preparation Preparation Preparation Implement- ation Analysis & Conception Quality Assurance & Tests Cutover
19. BASIS PP HR SD/ MM FI/ CO KU KU BC BC KU KU KU KU KU KU BC BC KU KU Team for User Roles and Authorizations KU = Key User BC = Basis User (technical authorization management)
20. SAP AG 1999 Step 2: Analysis & Conception Preparation Implement- ation Quality Assurance & Tests Cutover Analysis Analysis & & Conception Conception Measures: Determine User Roles Complete Roles Determine Framework for Implementing the Roles Check Framework for Implementing the Roles
21. Authorization List - Role Design Business Processes Financial Accounting General Ledger Processing Closing Operations Profit and Loss Adjustment General ledger: Profit and Loss Adjustment General ledger: Update Balance Sheet Adj . General ledger: Post Balance Sheet Readj . General ledger: Balance Sheet Readj ., Log General ledger: B/S Readj ., Spec. Functions Accounts Payable Accounting Invoices and Credit Memos Parked Document Posting [Vendors] Post Parked Document Change Parked Document Display Parked Document Change Parked Doc. (Header) Document Changes: Parked Documents Reject Parked Document Vendor Account Analysis Balance Analysis Customer Account Analysis Vendor Account Balance Display Vendor Balances Vendor Line Items Correspondence with Vendors Correspondence with Vendors Correspondence: Print Requests Correspondence: Print Internal Docs. Correspondence: Delete Requests Correspondence: Maintain Requests Instruction... Enterprise area Role name Scope Scope Scope Analysis: Determine User Roles F.50 F.5D F.5E F.5F F.5G FBV0 FBV2 FBV3 FBV4 FBV5 FBV6 FD11 FK10 FK10N FBL1N F.61 F.62 F.63 F.64
22. FI_ Manag AP_ Manag AP_ Acc Authorization List - Role Design Business Processes Financial Accounting General Ledger Processing Closing Operations Profit and Loss Adjustment General ledger: Profit and Loss Adjustment General ledger: Update Balance Sheet Adj . General ledger: Post Balance Sheet Readj . General ledger: Balance Sheet Readj ., Log General ledger: B/S Readj ., Spec. Functions Accounts Payable Accounting Invoices and Credit Memos Parked Document Posting [Vendors] Post Parked Document Change Parked Document Display Parked Document Change Parked Doc. (Header) Document Changes: Parked Documents Reject Parked Document Vendor Account Analysis Balance Analysis Customer Account Analysis Vendor Account Balance Display Vendor Balances Vendor Line Items Correspondence with Vendors Correspondence with Vendors Correspondence: Print Requests Correspondence: Print Internal Docs. Correspondence: Delete Requests Correspondence: Maintain Requests Instruction... Enterprise area Rollenname Scope Scope Scope FI FI FI x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x Conception: Complete User Roles (1) F.50 F.5D F.5E F.5F F.5G FBV0 FBV2 FBV3 FBV4 FBV5 FBV6 FD11 FK10 FK10N FBL1N F.61 F.62 F.63 F.64
23. Balance Analysis Vendor Line Items Display Vendor Balances Maintain Account Balances G/L Document Maintenance Accounts Payable Accounting Manager Post Documents Change Documents ........ Activity Block (Group of Related Activities) Role Activities Transactions, Reports User Role Composite Role Accounts Payable Accountant User User Master Record Technical Conception: Role Implementation (1)
26. Step 4: Quality Assurance & Tests Preparation Implement- ation Cutover Analysis & Conception Quality Quality Assurance Assurance & Tests & Tests Measures: Test User Roles and Authorization Concept Release Roles and Authorization Concept
27. Step 5: Cutover Preparation Implement- ation Quality Assurance & Tests Analysis & Conception Cutover Cutover Measures: Set Up Productive Environment Create User Master Records for Productive Users Accept Role and Authorization Project
28. User and Authorization Administration Strategy Preparation Implement- ation Quality Assurance & Tests Cutover Analysis & Conception Determine User and Determine User and Authorization Administration Strategy Authorization Administration Strategy Measures : Specify Technical User and Authorization Administration Strategy Specify User and Authorization Administration Procedure Train Users and Authorization Administrators
29. Development System User Administration System User and Authorization Administration Strategy System Administrator Authorization Data Administrator Create Role Authorization Profile Administrator User Administrator Maintain Users Assign Role Activate Profile Maintain Role
30. List the steps necessary to implement an authorization concept Describe the activities to be performed in each step Assign responsible persons to each activity Use the ASAP procedure model for implementing an authorization concept for your own projects You are now able to: Conception with ASAP Methodology: Unit Summary
32. The SAP R/3 authorization concept prevents unauthorized access to the system and to data and objects within the system. Users that are to perform specific functions in the SAP R/3 System need a user master record with the relevant authorizations. Elements of the SAP R/3 Authorization Concept: Business Scenario
33. Authorization object class Authorization object Authorization Profile - Role User Authorization field: Overview of the elements of the SAP R/3 authorization concept
36. Authorizations and Authorization Profiles Authorization Objects Work Center 1 Work Center 2 Work Center 3 F-22, F-27 FB02, FB03 F-43, F-41 FB02, FB03 01, 02, 03 1000 01, 02, 03 1000, 2000 01, 02, 03 A, D, S 01, 02, 03 K ....... ....... S_TCODE TCD F_BKPF_BUK ACTVT BUKRS F_BKPF_GSP ACTVT GSBER F_BKPF_KOA ACTVT KOART ....... 01, 02, 03 2000 Authorization Authorization Profile F-22, F-27 FB02, FB03 01, 02, 03 1000 01, 02, 03 2000 01, 02, 03 D ....... 03 1000
37. Authorization Check in the Program Change Accounting Document Transaction FB02 Program SAPMF05L .... AUTHORITY-CHECK OBJECT ´F_BKPF_BUK ´ ID ´ACTVT ´ FIELD ´02 ´ ID ´BUKRS ´ FIELD BUK. IF SY-SUBRC NE 0. MESSAGE E083 WITH BUK. ENDIF. ..... User Authorizations Object F_BKPF_BUK Authorization BUK 1000 Check Result Field Value ACTVT 02, 03 BUKRS 1000 Authorization BUK 1000 Authorization BUK 1000
38. Security Checks during Transaction Start Change Accounting Document System Program Authorization for transaction (Authorization Object S_TCODE)? Authorization for authorization object in table TSTCA? No No No No ABAP Program Authorization Checks Y Y E E S S Initial Screen Next Screen STOP STOP
39. Roles and Authorization Profiles Create Roles Using the Profile Generator (PFCG) Choose Activities (Transactions, Reports, Web links) Maintain Authorization Data (Define Authorization Objects) Generation User Menu Authorization Profile Authorization for Authorization Object xxx ....
40. Roles and the Easy Access Menu M enu E dit F avorites E x tras S y stem H elp Other menu Create menu Assign users Role SAP_BC_USER_ADMIN_AG Favorites SU01 User Maintenance User Administration SU01 - User Maintenance PFCG - Role Maintenance SU01D - Display User SU05 - Internet User Maintenance SU10 - User Mass Maintenace SUGR - Maintain User Groups
41. Describe the elements of the authorization concept Describe the process flow of an authorization check in the program Describe the authorization checks during transaction start Describe the differences between roles and authorization profiles Explain what the relationship between roles and the Easy Access menu You are now able to: Elements of the SAP R/3 Authorization Concept: Unit Summary
43. Identifying users by means of the user master record SAP R/3 user types Components of the user master record User buffer Change documentation Contents : The User Master Record
44. List the different SAP R/3 user types Distinguish between the components of the user master record Create and change user master records Evaluate change documents Display and archive change documents Analyze the user buffer Understand the function of the user buffer and evaluate the buffered user authorizations At the conclusion of this unit , you will be able to: The User Master Record : Unit Objectives
45. To access the SAP R/3 System and work with the data in the system , a user master record with appropriate authorizations is required . Other elements of the user master record make it easier to work with the SAP R/3 System. The User Master Record : Business Scenario
46. User Master Record Components Personal Personal Data Data , , Communication Communication Data Data , , Company Company Address Address User Group User Group , , User User Type, Type, Validity Period Validity Period Start Start Menu Menu , , Logon Logon Language Language , , Standard Printer Standard Printer Default Default Parameter Parameter IDs IDs Assignment of Assignment of Profiles Profiles Address Logon Data Defaults Parameters Roles Profiles Groups Display Display User User Saved User Last changed by Assignment of Assignment of User Groups User Groups Assignment of Assignment of Roles Roles
47. User Buffer User WolfMeier Role MY_FI_AR_DISPLAY_MASTER_DATA Authorization Profile T-T0030107 Logon to the SAP R/3 System User Buffer Object Authorization ........... F_BKPF_KOA T-T003010700 F_KNA1_AEN T-T003010700 F_KNA1_APP T-T003010700 F_KNA1_APP T-T003010701 F_KNA1_BED T-T003010700 F_KNA1_BUK T-T003010700 F_KNA1_GEN T-T003010700 F_KNA1_GEN T-T003010701 ...............
48. List the different SAP R/3 user types Distinguish between the components of the user master record Create and change user master records Evaluate change documents Display and archive change documents Analyze the user buffer Understand the function of the user buffer and evaluate the buffered user authorizations You are now able to: The User Master Record : Unit Summary
50. This unit describes how to design SAP Easy Access user menus for the various work centers (or roles) in your company and how to automatically generate authorization profiles for those menus. The first part of this unit deals with simpler basic maintenance. The focus is placed on the creation of menus and the associated authorizations, profiles, and user assignments. The second part deals with more advanced topics: The focus here is placed on derived and composite roles. Contents: Working with the Profile Generator
51. Perform the steps involved in assigning authorizations with the Profile Generator Copy, change, and create roles and determine their activities Display and maintain authorizations that were generated automatically At the conclusion of this unit, you will be able to: Working with the Profile Generator: Unit Objectives
52. When you create authorizations and authorization profiles for groups of users, you should use the Profile Generator. Based on selected menu functions, the Profile Generator automatically generates authorization data and offers it for postprocessing . Working with the Profile Generator: Business Scenario
53. The Profile Generator: Steps Role Profile Generator Work centre description : - Activity 1 - Activity 2 - ... Define Role Names • Define Activities • Design User Menus • Maintain Authorization Data • Generate Authorization Profile • Assign Users • Adjust User Master Records Description Menu Authorizations User
54. Profile Generator: Views Basic Maintenance: • Menu • Authorizations • Agents Overview: • Menu • Authorizations • Tasks • Agents • Organisational Management Role SAP_FI_AR_MASTER_DATA Description Accounts Payable Clerk Display Change Create Create Composite Role Simple Maintenance ( Workplace Menu Maintenance ) Basic Maintenance ( Menus , Profiles , Other Objects ) Overview ( Organisational Management and Workflow ) Information Simple Maintenance: • Menu • Agents Simple Maintenance: • Menu • Agents
55. SAP AG 1999 Profile Generator: Steps Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorizaion Profile Assign Users Adjust User Master Records
56. Role Description MY_ROLE FI: Accounts Payable Accountant Display Change Create Create Composite Role Information Role Descrption FI: AccountsPayable Accountant Description Menu Authorizations User Pers ... Information Other Role Beschreibung Menü Berechtigungen Benutzer Define Role Name and Description
57. Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorizaion Profile Assign Users Adjust User Master Records Profil e G enerator: Steps
58. Determine Activities Description Menu Authorizations User Web Link Transaction TA1 Role 1 Role 2 Transaction TA1 ??? Transaction TA2 Report Report xyz xyz Transaction TA1 Web Link Report Report xyz xyz Report Report xyz xyz Transaction TA1 Web Link Transaction TA3 Transaction TA1 Transaction TA1 Report Report xyz xyz
59. Profile Generator: Steps Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorizaion Profile Assign Users Adjust User Master Records
60. Design Menus Define Functions Customize Menu Structure Correspondence Closing Reporting Withholding Tax Information System Other Addresses From the SAP Menu From Other Role From Area Menu Import From File Translate Node Display Documentation Find in Docu . Role MY_ROLE Description FI: Accounts Payable Accountant - ( Template Copy ) Description Menu Authoirzations Users Pers .. URL - www . mysap . com URL - Route Planner SM04 - User List SE16 - Data Broswer Account Master Data FK01 - Create Vendor FK02 - Change Vendor FK03 - Display Vendor FK04 - Display Changes FK05 - Lock Vendor FK06 - Set Deletion Flag Confirmation of Change Compare Transaction Report Other All T70CLNT400 Distribute drag&drop Role Menu Description Menu Authorizations User Transaction TA3 Report Report xxx xxx Report Report zab zab Report Report xyz xyz Web Link Web Link Web Link Transaction TA2 Transaction TA1
61. Profile Generator: Steps Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorizaion Profile Assign Users Adjust User Master Records
62. Profile Generator: Create Authorization Profiles MY_ROLE FI: Accounts Payable Accountant Maint : 0 Unmaint . Org levels , 7 Open Fields , Status: Saved Gepflegt Old Cross - Application Authorization Objects Gepflegt Old Asset Management Gepflegt New Basis - Administration Standard New Authorization for File Access Standard New Authorization for File Access Maintained Old SAPscript : Standard text Standard Old Basis - Development Environment Maintained New Basis - Central Functions Standard Old Materials Management - Procurement Aktivity Physical File Name ABAP Program Name Description Menu Authorizations User Role MY_ROLE Description FI: Accounts Payable Accountant - created from SAP template Description Menu Authorizations User Angelegt Letzte Änderung Informationen zum Berechtigungsprofil Maintain Authorization Data and Generate Profiles User MEYERS Date 16.01.2000 Time 13:22:12 Benutzer BENZ Datum 18.01.2000 Uhrzeit 17:50:59 Profile name T-K6840005 Profile text Profile for Role MY_ROLE Status Current Version Not Generated Change Authorization Data Expert Mode for Profile Generation
63. Profile Generator: Steps Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorizaion Profile Assign Users Adjust User Master Records
64. Description Menu Authorizations User You can change the default profile name here Profie lname MY_ROLE_PF You will not be able to change this profile name later Text Profile for role MY_ROLE Assign Profile Name for Generated Authorization Profile Generate Authorization Profile MY_ROLE FI: Accounts Payable Accountant Maint .: 0 Unmaint . Org Levels , 7 Open Fields , Status: Saved Maintained Old Cross - Application Authorization Objects Maintained Old Asset Management Maintained New Basis - Administration Standard Old Basis - Development Environment Maintained New Basis - Central Functions Standard Old Materials Management - Procurement Activity Physical Filename ABAP Program Name Standard New Authorization for File Access Standard New Authorization for File Access Maintained Old SAPscript: Standardtext Generate
65. Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorization Profile Assign Users Adjust User Master Records Profil e Generator : Steps
66. Role 4 Role 3 Assigning Users to Roles Role 1 Role 2
67. Profile Generator: Steps Define Role Name Determine Activities Design User Menus Maintain Authorization Data Generate Authorizaion Profile Assign Users Adjust User Master Records
68. Comparing the User Master Description Menu Authorizations User Description Menu Authorizations User Pers ... Selection User Compare Role Description MY_ROLE FI: Accounts Payable Accountant Other Role Information Last Comparison User Date Time Complete Adjustment User Date Time Information for user master comparison Status User authorization changed since last save Complete Compare Expert Mode for Compare Information Compare Role User Master Record
69. Derived Roles ( Reference ) Role Authorizations for : • Plant 1 • Company Code 0020 • Business Area 110 • ... Authorizations for : • Plant 1 • Company Code 0020 • Business Area * • ... Organisational Structure Organisational Structure Organisational Structure Derived Role 3 Authorizations for : • Plant 2 • Company Code 0001 • Business Area 100 • ... Derived Role 1 Derived Role 2
70. Menus of Derived Roles Reference Role Derived Role 1 Changes to the menu are only possible here Derived Role 2 Derived Role 3
71. Composite Roles Role 1 Role 2 Role 3 Role 4 Role 6 Role 5 Composite Role A Composite Role B Role 7
72. Menus of Composite Roles Role 1 Menu Role 1 Menu Role 2 Role 2 Menu Role 1 Menu Role 2 Composite Role Changes to the Entire Menu Are Possible !
73. Perform the steps involved in assigning authorizations with the Profile Generator Copy, change, and create roles and determine their activities Display and maintain authorizations that were generated automatically You are now able to: Working with the Profile Generator: Unit Summary
75. Access Control and User Administration Special Users Administration Tasks in User and Authorization Administration SAP Authorization Objects for Protection from Access to Administration Functions Scenarios for Distributing Administration Tasks in the System Infrastructure Contents:
76. Access Control and User Administration: Unit Objectives Protect special users in SAP R/3. Describe tasks in user and authorization administration List options for separating functions of user and authorization administration. Describe options for decentralization of user administration. Create user and authorization administrators with limited rights At the conclusion of this unit, you will be able to:
77. Access Control and User Administration: Business Scenario In order to protect your SAP R/3 System against unauthorized access, you must define password rules, set the relevant profile parameters and protect special users. You must also define areas of responsibility for user and authorization administration. The organizational areas of responsibility must be clearly defined technically using authorizations.
78. Special Users Initial Logon Procedure in SAP Clients Client 000 001 066 Client (new) User SAP* DDIC EarlyWatch SAP* Initial password 06071992 19920706 support pass ! Since these users are generally known, they must be protected against unauthorized access.
79. User and Authorization Administration: Activities Create, maintain, lock and unlock users, and change passwords Create and Maintain Roles Maintain Transaction Selections and Authorization Data in Roles Generate Authorization Profiles Assign Roles and Profiles Transport Roles Monitor Using the Information System Archive Change Documents
80. An administrator may not Administer users and Maintain authorizations and Generate authorization profiles Separation of functions Principle of dual control User administration Authorization maintenance and generation Principle of triple control User administration Authorization maintenance Authorization generation Security Requirements
81. Separation of Functions User Administrator Authorization Data Administrator Authorization Profile Administrator Maintain user master records Assign roles to users Assign profiles to users (only T...) Display authorizations and profiles Call "Information System Authorizations" Superuser Maintain roles Change transaction selection Change authorization data Call "Information System Authorizations" Maintain roles Create authorizations (only T-...) Create profiles (only T-...) Execute Transaction SUPC Call "Information System Authorizations"
82. PP User Admin. MM User Admin. SD User Admin. CO User Admin. FI User Admin. Location 1 Location 2 Location 3 Location 4 User Administrator User Administrator User Administrator User Administrator Decentral User Administration
83. Central user administration One user administrator for all users Unlimited authorizations for all user administration tasks of the user administrator Central maintenance of roles and profiles One administrator takes on both roles Authorization data administrator Authorization profile administrator All authorizations for maintaining the roles and profiles Principle of dual control Scenario 1
84. Decentral user administration (production system) One user administrator per application area (FI, MM) Authorized to maintain a certain user group Authorized to assign a certain number of roles and profiles No other restrictions in the specific user administration tasks Central maintenance of roles and profiles Separation of responsibilities One authorization data administrator One authorization profile administrator No other restrictions in the specific roles or profiles for both administrators Principle of triple control Scenario 2
85. Central creation and deletion for all users (prod.) Decentral user administration (production system) One user administrator per application area (FI, MM) Authorized to maintain a certain user group Authorized to assign a certain number of roles and profiles Authorized for only certain user administration tasks (change, lock/unlock, reset password) Central maintenance of roles and profiles Separation of responsibilities One authorization data administrator One authorization profile administrator No other restrictions in the specific roles or profiles for both administrators Principle of triple control Scenario 3
86. Change password rules with system profile parameters Protect special users in the R/3 System. Describe tasks in user and authorization administration List options for separating functions of user and authorization administration Describe options for decentralization of user administration Create user and authorization administrators with limited rights You are now able to: Access Control and User Administration : Unit Summary