Types of HR Data
A discussion of SAP security for a particular application area, like HR, FICO, SD, MM generally starts with an outline
Read MoreLearn SAP Security & Authorizations Concepts
A discussion of SAP security for a particular application area, like HR, FICO, SD, MM generally starts with an outline
Read MoreThe names of most Security tables begin with USR, AGR or UST. Here are a few of the most common
Read MoreSAP delivers ECC 6.0 with more than 3000 authorization objects. Remembering even a tiny fraction of the total number is
Read MoreOften a security administrator comes across requirements where the existing authorization objects delivered by SAP is not enough. Mostly these
Read More“Organizational Levels” (Org Levels) as opposed to authorization fields is another of the core concepts that we come across while
Read MoreAs we have already seen in one of the earlier articles, individual user master records can be created/updated through the
Read MoreNew t-codes can be created through the transaction SE93. In the example below, the t-code is created to call a
Read MoreThe Data Browser (transaction SE16) allows us to display (or maintain) transparent tables from the ABAP Data Dictionary. Its an
Read MoreLike the Data Browser (SE16) reviewed in the last article, Quickviewer (transaction SQVI) is very useful tool for quick and
Read More