Fortifying the Digital Core with a Data-Centric Security Framework

802 results

  1. Best Practices and Scenarios for Working with Overall Authorizations

    Reading time: 13 mins

    Learn some best practices and scenarios for building a solid authorizations concept. See which combination of roles and structural authorizations is best for your company. Key Concept Overall authorizations are the combination of different types of roles and use of structural authorizations. For each specific need, a company needs to choose the implementation of roles...…

  2. Weigh Your Options for Implementing Overall Authorizations

    Reading time: 13 mins

    Learn the basic information for building an overall authorizations concept including specifications and examples for each different type of role as well as structural authorizations use. Also, see some examples of bad role design and specific actions to avoid. Key Concept General authorizations (or roles) can be described by the answers to two questions: “What...…

  3. Improve Enterprise Data Security and Compliance with Dynamic Authorizations

    Explore how Dynamic Authorization enables granular access control, simplifies access management, and automates regulatory compliance to enable safe and efficient collaboration.

  4. Avoid These Common Pitfalls in Using Reporting Authorizations With and Without Hierarchies

    Reading time: 35 mins

    Avoid unexpected report results when you use hierarchy authorizations by taking these simple steps. Key Concept Reporting authorizations allow you to grant access according to specific values of reporting objects such as profit center or cost center. Hierarchy authorizations provide further flexibility to grant access by reference to nodes in associated hierarchies. For example, an...…

  5. Critical Tips for Integrating Personnel Planning and Structural Authorizations

    Learn the importance of the connection between personnel planning functions and structural authorizations through these integration tips. Key Concept Personnel planning is the authorization object PLOG, which is included in general authorizations (roles). Personnel planning is used for checking authorizations for specific fields in the Personnel Management components (Organizational Management, Personnel Development, Training and Event...…

  6. Perform Authorizations Properly by Defining Authorization Main Switches

    Whether a company is implementing the SAP standard authorizations concept or the context-specific authorizations concept, some specific switches need to be applied. Learn about the importance of the main switches for SAP ERP HCM authorizations as well as specifications for employees in a default position. Key Concept Authorization main switches can be used to tailor...…

  7. Best Practices for Setting Up Authorization in Process Control 10.0

    Amit Saini explains how to set up authorization for different business users inside an organization using SAP Process Control. He also covers troubleshooting and best practices for different application scenarios in SAP Process Control. Key Concept A business role needs to be assigned to users for all SAP Process Control application entities such as organization,...…

  8. Do Some Authorization Detective Work with the User Information System

    Learn how to create, implement, and maintain a solid authorizations concept using transaction SUIM. Key Concept You can use transaction SUIM (user information system) to verify different authorizations-related functionalities. It can verify authorizations assigned to a specific user or multiple users. SUIM can also verify contents of roles and compare authorizations of two user IDs...…

  9. Prevent Users from Accessing Sensitive Data Using Authorization Restrictions

    Reading time: 11 mins

    Securing information within an SAP BW system is necessary, but it can be difficult because of the massive volumes of sensitive data that are stored in the system. Learn how to develop authorization restrictions for InfoObjects via transaction RSSM so end users can access only relevant data. Key Concept SAP BW has two types of authorization...…

  10. Protect Sensitive Data in Performance Management with Authorizations: Part 1

    During the objective setting and appraisal process, you need to protect sensitive personnel data. By using HR standard authorizations in combination with customizing settings that restrict appraisal document access, you will be able to set up a secure system in which only legitimate users can access sensitive data. You first need to understand the use...…