• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • 0
    Authorizations in SAP S/4hana and SAP Fiori

    Authorizations in SAP S/4hana and SAP Fiori by Banzer, Alessandro;

    Series: SAP PRESS Englisch;

      • GET 8% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice USD 89.95
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        34 945 Ft (33 281 Ft + 5% VAT)
      • Discount 8% (cc. 2 796 Ft off)
      • Discounted price 32 149 Ft (30 619 Ft + 5% VAT)

    34 945 Ft

    db

    Availability

    Temporarily out of stock.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher SAP Press
    • Date of Publication 24 March 2022

    • ISBN 9781493220366
    • Binding Hardback
    • No. of pages625 pages
    • Size 261x185x41 mm
    • Weight 1512 g
    • Language English
    • 0

    Categories

    Short description:

    Develop a complete authorization concept for SAP S/4HANA and SAP Fiori with this guide! Start by understanding how authorizations work in an ABAP system and exploring the transactions used for configuration. Then learn to create roles with Transaction SU24 and the Profile Generator, track and correct missing authorizations with traces, and more.

    More

    Long description:

    Develop a complete authorization concept for SAP S/4HANA and SAP Fiori with this guide! Start by understanding how authorizations work in an ABAP system and exploring the main transactions you'll use for configuration. Then learn to create roles with Transaction SU24 and the Profile Generator, track and correct missing authorizations with traces, manage users, and more. See how SAP Access Control can be a useful tool to manage authorizations and learn to migrate authorizations to SAP S/4HANA.

    Highlights include:
    1) ABAP authorizations
    2) Roles
    3) Transaction SU24
    4) Profile Generator
    5) Authorization traces
    6) User maintenance
    7) SAP Access Control
    8) Debugging
    9) Migration
    10) Xiting Authorizations Management Suite (XAMS)

    More

    Table of Contents:

    ... Preface ... 19

    ... Target Audience ... 19

    ... Structure of This Book ... 20

    ... Acknowledgments ... 21

    1 ... Introduction to SAP Authorizations ... 23

    1.1 ... What Are Authorizations? ... 24

    1.2 ... User Access in the SAP System ... 25

    1.3 ... Evolution of Authorizations from SAP ERP to SAP S/4HANA ... 26

    1.4 ... SAP Fiori (Presentation Layer) ... 34

    1.5 ... Native Authorizations in SAP HANA (Database Layer) ... 37

    1.6 ... Hybrid System Landscapes and Implications on Authorizations ... 38

    1.7 ... Summary ... 45

    2 ... ABAP Authorization Concept ... 47

    2.1 ... Influences on the SAP Authorization Concept ... 48

    2.2 ... Basic Principles for an SAP Authorizations Concept ... 49

    2.3 ... ABAP Authorizations ... 51

    2.4 ... Roles and Profiles ... 65

    2.5 ... Users ... 70

    2.6 ... Authority Checks ... 74

    2.7 ... Critical Authorizations ... 87

    2.8 ... Authorizations in SAP ERP Human Capital Management ... 102

    2.9 ... Different Transaction Types ... 106

    2.10 ... SAP System Check for Security Flaws ... 121

    2.11 ... Customizing of SAP Security Settings ... 130

    2.12 ... Summary ... 133

    3 ... Designing Authorization Concepts ... 135

    3.1 ... Role Design Approaches ... 135

    3.2 ... Role Types ... 139

    3.3 ... Segregation of Duties ... 146

    3.4 ... Determining When to Use Enabler Roles ... 147

    3.5 ... Role Naming Convention ... 152

    3.6 ... Summary ... 154

    4 ... Xiting Authorizations Management Suite ... 157

    4.1 ... Overview ... 158

    4.2 ... Xiting Role Designer ... 159

    4.3 ... Xiting ABAP Alchemist ... 165

    4.4 ... Xiting Role Replicator ... 169

    4.5 ... Xiting Role Builder ... 172

    4.6 ... Xiting Times ... 174

    4.7 ... Xiting Role Profiler ... 176

    4.8 ... Xiting Security Architect ... 179

    4.9 ... Summary ... 182

    5 ... Transaction SU24: Authorization Default Values ... 183

    5.1 ... Overview ... 184

    5.2 ... Transaction SU24 Maintenance ... 192

    5.3 ... Transaction SU24N ... 200

    5.4 ... Populating Data from Traces ... 205

    5.5 ... Best Practice Maintenance of Transaction SU24 ... 208

    5.6 ... Upgrading Authorization Default Values ... 223

    5.7 ... Transaction SU24 Optimization Tools ... 239

    5.8 ... Xiting Authorizations Management Suite: Transaction SU24 Optimization Tools ... 241

    5.9 ... Summary ... 243

    6 ... Role Maintenance in Transaction PFCG ... 245

    6.1 ... Navigation within Transaction PFCG ... 247

    6.2 ... Creation of Different Roles ... 256

    6.3 ... Role Menu Objects ... 270

    6.4 ... Authorization Maintenance in Roles ... 274

    6.5 ... Sustainable Role Building ... 290

    6.6 ... Role Versions ... 297

    6.7 ... Roles Overview Status ... 299

    6.8 ... Selected Mass Maintenance Options for Roles ... 301

    6.9 ... Transfer of Roles ... 306

    6.10 ... Xiting Authorizations Management Suite: Virtual Role Design with Xiting Role Designer ... 308

    6.11 ... Summary ... 312

    7 ... Authorization Analysis, Trace Tools, and Authorization Debugging ... 315

    7.1 ... Overview ... 316

    7.2 ... Transaction SU53 ... 320

    7.3 ... Transactions ST01/STAUTHTRACE ... 323

    7.4 ... Transaction STUSOBTRACE ... 329

    7.5 ... Transaction STUSERTRACE ... 333

    7.6 ... Authorization Debugging ... 337

    7.7 ... Xiting Authorizations Management Suite: Enhanced Trace Evaluation ... 344

    7.8 ... Summary ... 347

    8 ... SAP Fiori Authorizations ... 349

    8.1 ... Overview ... 349

    8.2 ... SAP Fiori Architecture ... 351

    8.3 ... Deployment Options ... 353

    8.4 ... SAP Fiori Apps Reference Library ... 356

    8.5 ... SAP Fiori Administrative Tools ... 360

    8.6 ... OData Services ... 366

    8.7 ... SAP Fiori Concept Implementation ... 369

    8.8 ... Frontend/Backend Server Authorizations ... 379

    8.9 ... Troubleshooting Tools for SAP Fiori ... 386

    8.10 ... Xiting Authorizations Management Suite: Tool-Driven SAP Fiori Objects Implementation and Analysis ... 392

    8.11 ... Summary ... 394

    9 ... User Maintenance ... 395

    9.1 ... Maintenance of the User Master Record ... 395

    9.2 ... Password Rules ... 415

    9.3 ... The User Buffer ... 417

    9.4 ... User Naming Conventions ... 419

    9.5 ... User Classification ... 421

    9.6 ... User-Related Tables ... 421

    9.7 ... User Access Reviews ... 422

    9.8 ... User Lock Status ... 423

    9.9 ... Security Policies ... 423

    9.10 ... Securing Default Accounts ... 428

    9.11 ... Maintaining User Groups ... 430

    9.12 ... Central User Administration ... 432

    9.13 ... SAP Usage Data for Users ... 436

    9.14 ... Summary ... 437

    10 ... Access Governance with SAP Access Control and SAP Cloud Identity Access Governance ... 439

    10.1 ... SAP Access Control ... 439

    10.2 ... SAP Cloud Identity Access Governance ... 443

    10.3 ... Understanding the Ruleset ... 449

    10.4 ... Segregation of Duties Management Process ... 456

    10.5 ... Custom Transactions for the Ruleset ... 463

    10.6 ... Business Roles ... 468

    10.7 ... User Access Review ... 470

    10.8 ... Roles for Firefighters ... 471

    10.9 ... Impact to Governance, Risk, and Compliance When Migrating and Upgrading SAP Systems ... 475

    10.10 ... Summary ... 476

    11 ... Interface Authorizations and Hardening of Interfaces ... 477

    11.1 ... Remote Function Call Security ... 477

    11.2 ... Best Practices ... 486

    11.3 ... SAP Unified Connectivity ... 491

    11.4 ... Xiting Authorizations Management Suite: Automated and Risk-Free Role Testing and Go-Live ... 493

    11.5 ... Summary ... 494

    12 ... Migrating Authorizations to SAP S/4HANA ... 497

    12.1 ... Overview ... 498

    12.2 ... SAP HANA Database ... 504

    12.3 ... SAP S/4HANA Deployment Options ... 507

    12.4 ... Business Process Changes through SAP S/4HANA ... 516

    12.5 ... Core Data Services in SAP S/4HANA ... 519

    12.6 ... Preparing for an SAP S/4HANA Migration ... 527

    12.7 ... Migrating Authorizations to SAP S/4HANA with Standard SAP Tools ... 541

    12.8 ... Xiting Authorizations Management Suite: Helpful SAP S/4HANA Migration Features ... 563

    12.9 ... Summary ... 566

    13 ... Migrating Authorizations to SAP S/4HANA with the Xiting Authorizations Management Suite ... 567

    13.1 ... SAP S/4HANA Migration Strategies with the Xiting Authorizations Management Suite ... 568

    13.2 ... Preparation Phase: Role Concept Validation ... 574

    13.3 ... Design Phase: Conceptual Role Migration ... 583

    13.4 ... Implementation Phase: SAP S/4HANA Role Implementation ... 588

    13.5 ... Validation Phase: SAP S/4HANA Role Concept Analysis ... 599

    13.6 ... Activation Phase: Role Concept-Protected Go-Live ... 605

    13.7 ... Summary ... 609

    ... The Authors ... 611

    ... Index ... 613


    More
    Recently viewed
    previous
    Authorizations in SAP S/4hana and SAP Fiori

    Authorizations in SAP S/4hana and SAP Fiori

    Banzer, Alessandro

    34 945 HUF

    The Fabulous Fibonacci Numbers

    The Fabulous Fibonacci Numbers

    Posamentier, Alfred S.; Posamentier, Alfred S.; Lehmann, Ingmar;

    9 104 HUF

    next