SAP Authorizations Use AGS Security Services - SAP Basis

Direkt zum Seiteninhalt
Use AGS Security Services
Our offer
Small companies would theoretically benefit from an authorization tool. However, in many cases the tools are too costly, so the cost-benefit ratio is usually not given.

GET_EMAIL_ADDRESS: The example implementation of this method reads the e-mail address from the system's user master record. Adjust the method if you want to read the email address from another source.
What to do when the auditor comes - Part 2: Authorizations and parameters
Even the best authorization tools cannot compensate for structural and strategic imbalances. Even a lack of know-how about SAP authorizations cannot be compensated for cost-effectively by means of tools.

Suggested values are maintained in the transaction SU24 and delivered through the transaction SU22. Read more about the differences between these two transactions. Maintaining suggestion values via the SU24 transaction is useful if you want to reflect your own requirements or if the values provided by SAP do not meet customer requirements (see Tip 37, "Making sense in maintaining suggestion values"). These proposed values form the basis for the role maintenance credentials in the PFCG transaction. As you know, the suggested values provided by SAP are in the transaction SU22, which are delivered during reinstallation or upgrades as well as in support packages or SAP hints. What is the difference between transactions and how are they used correctly?

"Shortcut for SAP systems" is a tool that enables the assignment of authorizations even if the IdM system fails.

There will be regular transactions used in multiple roles.

Suggested values are maintained in the transaction SU24 and delivered through the transaction SU22.
SAP BASIS
Zurück zum Seiteninhalt