Latest News
Moving to a new organization from May so its very possible that I do not get time to update this
Read MoreLearn SAP Security & Authorizations Concepts
Moving to a new organization from May so its very possible that I do not get time to update this
Read MoreThe idea for this post was suggested to me by one of the visitors of this blog, who had put
Read MoreIn the last article we have already looked at the process of indirect role assignment through OM objects. SAP provides
Read MoreWe have come across the Organizational Management (OM) component while talking about SAP HCM. The OM component in SAP is
Read MoreThe concept of parent and derived roles was introduced by SAP to simplify role administration tasks. Its specially helpful while
Read MoreTill now, all our discussion on role administration has been concentrated on creation and maintenance of single roles. A single
Read MoreTransaction variants allows us to selectively mask certain fields in SAP transactions/screens. Though strictly not a security tool, transaction variants
Read MoreThe SU25 transaction is needed during the initial installation of SAP and during each subsequent upgrade. Its main utility is
Read MoreThe PRGN_CUST tables contains entries for a number of switches which can affect the default behavior of various security transactions.
Read MoreDuring installation or an upgrade, SAP delivers a set of default authorization objects which are checked for each t-code which
Read More