SE16N and SAP_EDIT
This is a continuation of the many different articles on this blog around security around tables. However, the articles till
Read MoreLearn SAP Security & Authorizations Concepts
This is a continuation of the many different articles on this blog around security around tables. However, the articles till
Read MoreFew aspects of SAP Security are as well explored by Security Consultants as security for Tables. SAP already provides a
Read MoreWe have already looked at the other SAP authorization objects used to secure tables, S_TABU_DIS, S_TABU_CLI, S_TABU_NAM. We end our
Read MoreAs security consultants, we are often asked to secure or grant access to SAP tables. So most of us are
Read MoreThe PRGN_CUST tables contains entries for a number of switches which can affect the default behavior of various security transactions.
Read MoreThe names of most Security tables begin with USR, AGR or UST. Here are a few of the most common
Read MoreThe Data Browser (transaction SE16) allows us to display (or maintain) transparent tables from the ABAP Data Dictionary. Its an
Read MoreLike the Data Browser (SE16) reviewed in the last article, Quickviewer (transaction SQVI) is very useful tool for quick and
Read More