Title: sap security online training in usa-uk-canada | spectotraining
1SAP Security Online Training in usa
CONTACT US SPECTO TRAINING INDIA
91-9533456356 info_at_spectoittraining.com
www.spectoittraining.com http//www.saponlinetrai
ning.in/sap-security-online-training/
2Sap security online training
- Sap apo online training in usa
- Sap apo online training in uk
- Sap apo online training in australia
- Sap apo online training in canada
- Sap apo online training in pune
- Sap apo online training in singapore
- Sap apo online training in south africa
- Sap apo online training in dubai
- Sap apo online training in malaysia
- Sap apo online training in india
- Sap apo online training in mumbai
3Sap security online training
- Online classes on sap security in uk
- Live classes on sap security in usa
- Training classes on sap security in australia
- Learn best tutorial on sap security in london
- The best training course on sap security in usa
- Best tutorials on sap security training in canada
- Sap security training classes by real time
experts - Sap security training in hyderabad
4SAP Security Online Training
- Introduction
- What is Security
- Building blocks
- Common terminologies used Most Common
- tools in Security
- CUA
www.spectoittraining.com
5Sap security online training
www.spectoittraining.com
6SAP Security Online Training
- What is Security?
- Security concept is same around the globe like in
your normal life, security - means removing or restricting unauthorized access
to your belongings. For - example your Car, laptop or cared cards etc
- IT Security?
- Information security (sometimes shortened to
InfoSec) is the practice - defending information from unauthorized access,
use, disclosure, disruption, - modification, perusal, inspection, recording or
destruction. It is a general term - that can be used regardless of the form the data
may take (electronic, physical, - etc...)
- SAP Security?
- In the same context of InfoSec. SAP security have
the same meaning or in other words - who can do
what in SAP?
www.spectoittraining.com
7SAP Security Online Training
- Building Blocks
- User Master
- Record Roles
- Profiles Authorization
- Objects
www.spectoittraining.com
8SAP Security Online Training
- User Master Record?
- A User initially has no access in SAP
- When we create access in system it defines UMR
User Master Record information includes - Name, Password, Address, User type, Company
information - User Group
- Roles and Profiles
- Validity dates (from/to)
- User defaults (logon language, default printer,
date format, etc) - User Types Dialog typical for most users
System cannot be used for dialog login, can
communicate between systems and start background
jobs Communications Data cannot be used for
dialog login, can communicate between systems but
cannot start background jobs Reference cannot
log in, used to assign additional Authorizations
www.spectoittraining.com
9SAP Security Online Training
- Roles and Profiles Roles is group of tcode (s),
which is used to perform a specific business
task. - Each role requires specific privileges to perform
a function in SAP that is called AUTHORIZATIONS
There are 3 types of Roles - Single an independent Role
- Derived has a parent and differs only in
Organization Levels. Maintain Transactions, Menu,
Authorizations only at the parent level - Composite container that contains one or more
Single or Derived Roles
www.spectoittraining.com
10SAP Security Online Training
- Authorization Objects
- Authorization Objects are the keys to SAP
security - When you attempt actions in SAP the system
checks to see whether you have the appropriate
Authorizations - The same Authorization Objects can be used by
different Transactions
www.spectoittraining.com
11SAP Security Online Training
- User Buffer?
- When a User logs into the system, all of the
Authorizations that the User has are loaded into
a special place in memory called the User Buffer - As the User attempts to perform activities, the
system checks whether the user has the
appropriate Authorization Objects in the User
Buffer. - You can see the buffer in Transaction .
www.spectoittraining.com
12SAP Security Online Training
- Executing a Transaction (Authorization Checks)
- Does the Transaction exist? All Transactions have
an entry in table TSTC - Is the Transaction locked? Transactions are
locked using Transaction SM01 Once locked, they
cannot be used in any client - Can the User start the Transaction? Every
Transaction requires that the user have the
Object S_TCODETransaction Name Some Transactions
also require another Authorization Object to
start (varies depending on the Transaction) - What can the User do in the Transaction? The
system will check to see if the user has
additional Authorization Objects as necessary
www.spectoittraining.com
13 CONTACT US SPECTO TRAINING INDIA
91-9533456356 info_at_spectotraining.com
www.spectoittraining.com