Hi,
I am looking for a way to restricted the following T-codes to DISPLAY only.
BCA_DATE_POST_SET
BCA_DATE_EOD_SET
I have checked SU24 which has given me the Auth Object F_EODP_ACT.
Within F_EODP_ACT I can only limit on Execu...
Hi,
I have a requirement based around auth checks in the backend ABAP system. In the environment there is a front end system which has it's own auth checks on entitlements given to a user, but the second check needs to happen in the backend. Each u...
Hi,
I would like to get some thoughts on the below design/concept, and if there are more simpler ways to achieve this.
There are 2 IDM systems in this scenario
...
SAP remote connections via SAP Router and it’s security
What is SAP Router?
What is SAP Router used for?
What SAP Router doesn’t support?
What protocols does SAP Router use?
What is SAP Protocol?
How are the connections between a custome...
Hi,
Can anyone tell me how the strings are stored in the SAP Route Permission Table?
Are they encrypted or stored as plain text? As there is an option to include a password here, I was hoping to find out if this is stored as plain text.
Thank...
It's completely down to the business case and policies, if a customer wishes not to do it, it's at their own risk. Usually the business will specify their security policies which you incorporate into your design.
The default location when the audit trail is set to SYSLOG, is in-fact the SYSLOG. The operating systems that run SAP HANA have a secure central location to which events can be written, called a syslog. This location can contain audit logs and other ...
Thank you for the blog. It would help if the "Create a User in the PI" was expanded upon as this is a fundamental part of the communication process. Usually giving any user full access would not be recommended, a segregated role assignment is always ...