Efficient Optimization for License Management with Xiting

376 results

  1. Avoid These Common Pitfalls in Using Reporting Authorizations With and Without Hierarchies

    Reading time: 35 mins

    Avoid unexpected report results when you use hierarchy authorizations by taking these simple steps. Key Concept Reporting authorizations allow you to grant access according to specific values of reporting objects such as profit center or cost center. Hierarchy authorizations provide further flexibility to grant access by reference to nodes in associated hierarchies. For example, an...…

  2. Critical Tips for Integrating Personnel Planning and Structural Authorizations

    Learn the importance of the connection between personnel planning functions and structural authorizations through these integration tips. Key Concept Personnel planning is the authorization object PLOG, which is included in general authorizations (roles). Personnel planning is used for checking authorizations for specific fields in the Personnel Management components (Organizational Management, Personnel Development, Training and Event...…

  3. Perform Authorizations Properly by Defining Authorization Main Switches

    Whether a company is implementing the SAP standard authorizations concept or the context-specific authorizations concept, some specific switches need to be applied. Learn about the importance of the main switches for SAP ERP HCM authorizations as well as specifications for employees in a default position. Key Concept Authorization main switches can be used to tailor...…

  4. Best Practices for Setting Up Authorization in Process Control 10.0

    Amit Saini explains how to set up authorization for different business users inside an organization using SAP Process Control. He also covers troubleshooting and best practices for different application scenarios in SAP Process Control. Key Concept A business role needs to be assigned to users for all SAP Process Control application entities such as organization,...…

  5. Do Some Authorization Detective Work with the User Information System

    Learn how to create, implement, and maintain a solid authorizations concept using transaction SUIM. Key Concept You can use transaction SUIM (user information system) to verify different authorizations-related functionalities. It can verify authorizations assigned to a specific user or multiple users. SUIM can also verify contents of roles and compare authorizations of two user IDs...…

  6. Prevent Users from Accessing Sensitive Data Using Authorization Restrictions

    Reading time: 11 mins

    Securing information within an SAP BW system is necessary, but it can be difficult because of the massive volumes of sensitive data that are stored in the system. Learn how to develop authorization restrictions for InfoObjects via transaction RSSM so end users can access only relevant data. Key Concept SAP BW has two types of authorization...…

  7. Protect Sensitive Data in Performance Management with Authorizations: Part 1

    During the objective setting and appraisal process, you need to protect sensitive personnel data. By using HR standard authorizations in combination with customizing settings that restrict appraisal document access, you will be able to set up a secure system in which only legitimate users can access sensitive data. You first need to understand the use...…

  8. SAP NetWeaver 2004s: New Analysis Authorizations Ease Administration

    A new transaction in SAP NetWeaver 2004s eases the task of creating and optionally assigning reporting authorizations to users. Get expert advice about using transaction RSECADMIN. Key Concept SAP BI manages two different categories of authorizations. One is warehouse level and the other is analysis authorizations (previously called reporting authorizations). Analysis authorizations focus on what...…

  9. Quickly Update A Report’s Authorization Group by Using Program RSCSAUTH

    Find out how to use program RSCSAUTH effectively to ensure data privacy. Key Concept By using program RSCSAUTH (maintain/restore authorization groups), you can easily manage your users’ access to execute programs within your SAP system and avoid a flaw in data privacy protection. SAP uses authorization groups to determine which users have access to SAP...…

  10. How to Combat Performance Bottlenecks in Structural Authorization Checks

    Reading time: 9 mins

    Learn best practices to enhance and optimize the process of structural authorization checks, such as using evaluation paths, creating indexes, and buffering large numbers of structural authorization check objects in the SAP memory via standard SAP reports. Key Concept Structural authorization is an authorization concept used to restrict and control access to data stored in...…