Fortifying the Digital Core with a Data-Centric Security Framework
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP Currency Risk
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Advanced Financial Closing
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP SWIFT Compliance
- SAP Treasury Management
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Digital Signature
- SAP Container Platform
- SAP HANA Enterprise Cloud
- SAP Digital Asset Management
- SAP HEC
- SAP Digital Integration Hub
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Smart Forms
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
802 results
-
Best Practices and Scenarios for Working with Overall Authorizations
Reading time: 13 mins
Learn some best practices and scenarios for building a solid authorizations concept. See which combination of roles and structural authorizations is best for your company. Key Concept Overall authorizations are the combination of different types of roles and use of structural authorizations. For each specific need, a company needs to choose the implementation of roles...…
-
Weigh Your Options for Implementing Overall Authorizations
Reading time: 13 mins
Learn the basic information for building an overall authorizations concept including specifications and examples for each different type of role as well as structural authorizations use. Also, see some examples of bad role design and specific actions to avoid. Key Concept General authorizations (or roles) can be described by the answers to two questions: “What...…
-
Improve Enterprise Data Security and Compliance with Dynamic Authorizations
Explore how Dynamic Authorization enables granular access control, simplifies access management, and automates regulatory compliance to enable safe and efficient collaboration.
-
-
Avoid These Common Pitfalls in Using Reporting Authorizations With and Without Hierarchies
Reading time: 35 mins
Avoid unexpected report results when you use hierarchy authorizations by taking these simple steps. Key Concept Reporting authorizations allow you to grant access according to specific values of reporting objects such as profit center or cost center. Hierarchy authorizations provide further flexibility to grant access by reference to nodes in associated hierarchies. For example, an...…
-
Critical Tips for Integrating Personnel Planning and Structural Authorizations
Learn the importance of the connection between personnel planning functions and structural authorizations through these integration tips. Key Concept Personnel planning is the authorization object PLOG, which is included in general authorizations (roles). Personnel planning is used for checking authorizations for specific fields in the Personnel Management components (Organizational Management, Personnel Development, Training and Event...…
-
Perform Authorizations Properly by Defining Authorization Main Switches
Whether a company is implementing the SAP standard authorizations concept or the context-specific authorizations concept, some specific switches need to be applied. Learn about the importance of the main switches for SAP ERP HCM authorizations as well as specifications for employees in a default position. Key Concept Authorization main switches can be used to tailor...…
-
Best Practices for Setting Up Authorization in Process Control 10.0
Amit Saini explains how to set up authorization for different business users inside an organization using SAP Process Control. He also covers troubleshooting and best practices for different application scenarios in SAP Process Control. Key Concept A business role needs to be assigned to users for all SAP Process Control application entities such as organization,...…
-
-
Do Some Authorization Detective Work with the User Information System
Learn how to create, implement, and maintain a solid authorizations concept using transaction SUIM. Key Concept You can use transaction SUIM (user information system) to verify different authorizations-related functionalities. It can verify authorizations assigned to a specific user or multiple users. SUIM can also verify contents of roles and compare authorizations of two user IDs...…
-
Prevent Users from Accessing Sensitive Data Using Authorization Restrictions
Reading time: 11 mins
Securing information within an SAP BW system is necessary, but it can be difficult because of the massive volumes of sensitive data that are stored in the system. Learn how to develop authorization restrictions for InfoObjects via transaction RSSM so end users can access only relevant data. Key Concept SAP BW has two types of authorization...…
-
Protect Sensitive Data in Performance Management with Authorizations: Part 1
During the objective setting and appraisal process, you need to protect sensitive personnel data. By using HR standard authorizations in combination with customizing settings that restrict appraisal document access, you will be able to set up a secure system in which only legitimate users can access sensitive data. You first need to understand the use...…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent