SAP R/3 Security Online Training
- Overview of SAP
- Overview of SAP BASIS
- Introduction to SAP Security
- Why we need security
- What needs to be protected
- From whom we need to protect
- Implementation methodology
- User administration
- Single user administration
- Mass User administration
- LSMW Script running
- Introduction of CUA (Central User administration)
- CUA Configuration for different landscapes
- Performing user administration activities in CUA
- Distributing User/IDOCS and troubleshooting issues
- User Groups Concept
- Role Administration and authorizations concept
- Overview of authorizations and roles
- Change management process
- Creating custom authorization objects
- SAP Role types
- Working with Profile Generator
- Creating and modifying different roles
- Authorization Group Concept
- Missing authorization
- Tracing the user for missing authorization.
- Working with R/3 tables, parameters and Reports
- SAP Security Audit
BI Security Online Training
- Difference between BW & BI functionalities
- Analysis authorizations
- Difference between BW 3.x & BI7.0
- TCodes&Tables in BI
- Securing reporting Users access
- Authorization trace
- Creation & assignment of Analysis authorizations
- Securing access to workbooks
- Additional BI7 security features
HR Security Online Training
- Structural authorizations
- HR Master Data authorizations
- Authorization main switches
- Authorization objects for payroll
- Info types concept
- Tables in HR
|
No comments:
Post a Comment