Lukardi Blog
The concept of Entitlements, in addition to the entitlement reorganization project appears like a horror to audited managers and entitlement administrators. However, this is only the case if such documentation has not been kept in the organization or has not been updated for many years, and often since the implementation of SAP in the company. One could
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Business doesn't like chaos and hates uncertainty Roles, permissions and authorizations in SAP is a river topic that we have covered several times. We've written about the dangers that arise from a lack of conceptualization of authorizations, poorly managed authorization procs and the associated risks to the organization. Today, in
It is worth noting that in the case of reorganization of authorizations, it is also possible to apply the so-called "creeping project", that is, we fix and seal the system step by step. This is a good option when we have few human resources, time and money for a big reorganization project.
SAL will ensure the security of the system only if it is properly configured (SM19/RSAU_CONFIG) AND looked after (SM20/RSAU_READ_LOG), and if access to it is strictly limited and controlled. Both the Basis department and security key users (auditors) have something to say at the configuration.