SPECTO IT TRAINING provides quality education to the aspirants,we are providing online training on SAP,ORACLE,MICROSOFT DYNAMICS with professional trainers .we offers online training with best prices at SPECTO we focus directly on main points and delivering the right skills,our Online Training provides facilities like study at home & flexible time table.
website:www.saponlinetraining.in,For any further details please
Email id:info@spectoittraining.com
contact India +91-9533456356,USA :+1-847-787-7647.
http://spectoittraining.com/
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Sap security online training | spectotraining
1. CONTACT US:
SPECTO TRAINING
INDIA +91-9533456356
info@spectoittraining.com
www.spectoittraining.com
http://www.saponlinetraining.in/sap-
security-online-training/
2. Sap apo online training in usa
Sap apo online training in uk
Sap apo online training in australia
Sap apo online training in canada
Sap apo online training in pune
Sap apo online training in singapore
Sap apo online training in south africa
Sap apo online training in dubai
Sap apo online training in malaysia
Sap apo online training in india
Sap apo online training in mumbai
3. Online classes on sap security in uk
Live classes on sap security in usa
Training classes on sap security in australia
Learn best tutorial on sap security in london
The best training course on sap security in usa
Best tutorials on sap security training in canada
Sap security training classes by real time
experts
Sap security training in hyderabad
4. Introduction
What is Security
Building blocks
Common terminologies used Most Common
tools in Security
CUA
www.spectoittraining.com
6. What is Security?
Security concept is same around the globe like in your normal life, security
means removing or restricting unauthorized access to your belongings. For
example your Car, laptop or cared cards etc
IT Security?
Information security (sometimes shortened to InfoSec) is the practice
defending information from unauthorized access, use, disclosure,
disruption,
modification, perusal, inspection, recording or destruction. It is a general
term
that can be used regardless of the form the data may take (electronic,
physical,
etc...)
SAP Security?
In the same context of InfoSec. SAP security have the same meaning… or in
other words - who can do what in SAP?
www.spectoittraining.com
7. Building Blocks
User Master
Record Roles
Profiles Authorization
Objects
www.spectoittraining.com
8. User Master Record?
A User initially has no access in SAP
When we create access in system it defines UMR User Master Record
information includes:
Name, Password, Address, User type, Company information
User Group
Roles and Profiles
Validity dates (from/to)
User defaults (logon language, default printer, date format, etc)
User Types: Dialog – typical for most users System – cannot be used
for dialog login, can communicate between systems and start
background jobs Communications Data – cannot be used for dialog
login, can communicate between systems but cannot start background
jobs Reference – cannot log in, used to assign additional
Authorizations
www.spectoittraining.com
9. Roles and Profiles Roles is group of tcode (s), which is used to
perform a specific business task.
Each role requires specific privileges to perform a function in
SAP that is called AUTHORIZATIONS There are 3 types of
Roles:
Single – an independent Role
Derived – has a parent and differs only in Organization Levels.
Maintain Transactions, Menu, Authorizations only at the parent
level
Composite – container that contains one or more Single or
Derived Roles
www.spectoittraining.com
10. Authorization Objects
• Authorization Objects are the keys to SAP security
• When you attempt actions in SAP the system checks to
see whether you have the appropriate Authorizations
• The same Authorization Objects can be used by
different Transactions
www.spectoittraining.com
11. User Buffer?
• When a User logs into the system, all of the Authorizations that
the User has are loaded into a special place in memory called the
User Buffer
• As the User attempts to perform activities, the system checks
whether the user has the appropriate Authorization Objects in
the User Buffer.
• You can see the buffer in Transaction .
www.spectoittraining.com
12. Executing a Transaction (Authorization Checks)
1) Does the Transaction exist? All Transactions have an entry in table
TSTC
2) Is the Transaction locked? Transactions are locked using
Transaction SM01 Once locked, they cannot be used in any client
3) Can the User start the Transaction? Every Transaction requires that
the user have the Object S_TCODE=Transaction Name Some
Transactions also require another Authorization Object to start
(varies depending on the Transaction)
4) What can the User do in the Transaction? The system will check to
see if the user has additional Authorization Objects as necessary
www.spectoittraining.com