A move is imminent
A BW system often plays a very central role in larger companies. Here the data from the various connected source systems are analysed and reported centrally. A previous customer of mine had a BW system, to which a total of over 20 other SAPP production systems were connected. With such a large and mostly living system landscape, it is normal that individual systems are dismantled from time to time. However, especially with large SAP landscapes, there are strict regulations regarding the permissions of technical RFC users. For this reason, the simple "right-click —> delete" of a source system in RSA1 will often not lead to the target, but rather to a failed permission check. With this blog post, I'll show you a workaround on how to clean a source system from a BW system using the RSAR_LOGICAL_SYSTEM_DELETE and RSAP_BIW_DISCONNECT function blocks.
If you want to evaluate for which tables a logging takes place, the table DD09L is suitable for this. The column "Log" shows you for which tables changes are logged.
Objectives of the training SAP HANA - Installation and Administration:
Will Blockchain's Economy and Administration Revolutionise? What is a blockchain? A blockchain is a complete and unchanging transaction history of all transactions of a decentralised community that everyone who is part of it agrees to. The word blockchain first fell in connection with Bitcoin as a decentralised network for payments in the digital currency of the same name. The blockchain describes an underlying technology in which all transactions are publicly and unchangeably recorded. This transaction history is updated periodically. Each participant in the decentralised community accepts it as a reality, stores it on their computer, and can thus ensure at any time that no one can duplicate expenditure, as this would lead to a conflict in the transaction history elsewhere. A peculiarity of blockchain technology is that it has solved the "Double Spending Problem". Double-spending means something that can be doubled, and by 2008, only one central institution was considered to be sustainable. Double Spending can best be understood using the example of an image on a mobile phone. When I upload it to Facebook, I made a copy of it and I can upload it to Instagram, for example. So I used my picture "double". This effect made it impossible to establish a trustworthy, decentralised digital currency by 2008.
Without this provisioning component, adjustments to employee permissions in the respective IT resources would have to be implemented by the relevant system administrators. However, manual provisioning processes are by their very nature a source of errors. If an employee's tasks change, the system administrator should consider all active user accounts when modifying and deleting accounts. A modern IDM system therefore helps companies to keep track of users and their permissions, especially in complex and heterogeneous system landscapes.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
This is achieved by integrating live data such as configuration settings and defined rules directly from the connected system.
Both ABAP and Java stack can be monitored from one platform.