Title: sap security online training tutorial
1SAP security online training
Online classroom Corporate Training
certifications placements support
CONTACT US MAGNIFIC TRAINING INDIA
91-9052666559 USA 1-678-693-3475
info_at_magnifictraining.com www.
magnifictraining.com
2SAP Security Online Training
- Course Content
- Security audit consideration
- Security layers
- Data layer
- Access security
- Operational security
- Audit Security Security audit log parameters.
- Application on R/3 Security.
- OS level security Change management.
- Types of Securitys
- Internal Security
- External Security
- SAP Security
www. magnifictraining.com
3SAP Security Online Training
- User administration Types of Users.
- Central user administration (CUA).
- Authorizations
- Authorization Objects
- Authorization profiles
- Programming authorizations
- Authorization groups
- Missing authorizations
- Authorization Trace.
- Roles
- Composite Role
- Single Role
- Derived Role
- Parent Role Child Role.
www. magnifictraining.com
4SAP Security Online Training
- Transportations of Roles Role Mitigation.
- The complete User status (SUIM).
- Locking transactions.
- Restricting access to SAP DDIC.
- SAP R/3
- SAP History .
- SAP R/3 architecture Layers.
- Client administration.
- Spool administration Basics.
- Background jobs.
- Monitoring.
- Transport management Basics.
www. magnifictraining.com
5SAP Security Online Training
- SAP Security online training inside the SAP R/3
setting a group action represents a series of
connected steps needed to perform a definite
task.The user management method deals with
aspects of modification that happens to the users
within the system. this variation may be as a
result of inactivity, deed the corporate or
obtaining extra responsibilities. The audit
cluster can examine the approval method,
documentation of the approvals and execution.
www. magnifictraining.com
6SAP Security Online Training
- SAP Security online training SAP Security is that
the back bone of the access to the SAP system.
thus bulk of the SAP risk comes from the SAP
Security configurations and access settings. The
SAP Security configuration is finished in SAP
Roles that ar created by the protection
directors. The SAP Roles essentially contain
what's referred to as transactions. Generally
sense the group action represents Associate in
Nursing activity performed by Associate in
Nursing individual(s) in support of their every
day responsibilities.
www. magnifictraining.com
7SAP Security Online Training
- SAP R/3 architecture Layers.
- Client administration.
- Spool administration Basics.
- Background jobs.
- Monitoring.
- Transport management Basics.
www. magnifictraining.com
8 SAP Security Online Training
- How do we determine correct accesses required?
- ? SAP has various tools to analyse access errors
and determine correct Authorizations required - ?Use Last Failed Authorization check - SU53 (60
effective) - ?Use Assignment of Auth Object to Transactions -
SU24 (60 effective) - ?Trace the Authorizations for a function - ST01
(90 effective)
www. magnifictraining.com
9 SAP Security Online Training
- SU56 Display user buffer
- ST01 User trace
- SM19 Audit Log Configuration
- SM20 Display Audit Log
- S_BCE_68002111 List of users with Critical
Authorisations
www. magnifictraining.com
10 SAP Security Online Training
- Password Controls - cont. ?
- SAP Password System Parameters - system wide
settings that can be configured by - MPL - Minimum Password Length Password locked
after unsuccessful login attempts Password
Expiration time Password complexity ? - Illegal Passwords MPL can define passwords that
cannot be used
www. magnifictraining.com
11 SAP Security Online Training
- We offer you
- 1. Interactive Learning at Learners
convenience2. Industry Savvy Trainers3. Learn
Right from Your Place4. Customized Curriculum5.
24/7 system access6. Highly Affordable
Courses7. Support after Training a. Resume
Preparation b. Certification Guidance c.
Interview assistance
www. magnifictraining.com
12 Thank you
SAP Security Online Training